J:\UgppBdEjuG\bqjvxkbnIwgm\sPCMSLfA.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9ffd5ab284a16d9b6bf135a47b0da414_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9ffd5ab284a16d9b6bf135a47b0da414_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9ffd5ab284a16d9b6bf135a47b0da414_JaffaCakes118
-
Size
221KB
-
MD5
9ffd5ab284a16d9b6bf135a47b0da414
-
SHA1
2f7a711e551011dece1434ddc8e20ccf1daa6065
-
SHA256
74afbe4976ac748a797b34fec6c3688a47678077a1487e96aa1b2389244ed574
-
SHA512
f56684234aab3977be2dda09686aadd5fa96df704dd7c62048d86f9179c7479d43d3aa1e142d9ed897f1291c6f0095738c10fcb820fe7541954b0ee7a1a9d902
-
SSDEEP
3072:IiX8akkB7kzb70aE0CUIdQiMOh+gnAJIXYW5P4BUrcXw9SiJkASyZid6v+JBQCHV:I28a2pE0CjPIOAMYNGgg4iJkASCgnRD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9ffd5ab284a16d9b6bf135a47b0da414_JaffaCakes118
Files
-
9ffd5ab284a16d9b6bf135a47b0da414_JaffaCakes118.exe windows:5 windows x86 arch:x86
efb4dd028ebf68da6803f69527179846
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
GetProcessImageFileNameW
kernel32
GetComputerNameA
GetFileAttributesExW
QueryDosDeviceW
GlobalGetAtomNameW
lstrcpyW
lstrcpynW
EscapeCommFunction
GetProcAddress
LocalLock
CreateEventA
GetWindowsDirectoryW
CreatePipe
TerminateThread
FindFirstChangeNotificationW
SetCommMask
HeapFree
GetTempPathA
FindFirstFileW
HeapAlloc
MapViewOfFile
lstrcpynA
OpenFileMappingW
GlobalFlags
TransactNamedPipe
GetProcessHeap
GetFileAttributesExA
FindResourceW
DeleteCriticalSection
RaiseException
FileTimeToSystemTime
MoveFileExW
GetSystemWindowsDirectoryA
GetBinaryTypeW
FlushFileBuffers
UnhandledExceptionFilter
ReleaseMutex
FoldStringW
SetCurrentDirectoryW
PulseEvent
GetFileAttributesA
ResumeThread
VirtualAlloc
GetCompressedFileSizeW
GlobalFindAtomW
FreeResource
SetLocalTime
CreateNamedPipeA
SetPriorityClass
GetTempPathW
GetStartupInfoA
CallNamedPipeW
LoadResource
LCMapStringW
GetLocaleInfoA
UnmapViewOfFile
AddAtomA
msvcrt
bsearch
isxdigit
mbstowcs
wcschr
_controlfp
localtime
wcstod
printf
floor
tolower
wcscoll
wcscmp
strchr
fread
__set_app_type
wcscat
atoi
ungetc
__p__fmode
wcslen
__p__commode
time
_amsg_exit
gets
fprintf
exit
_initterm
_ismbblead
_XcptFilter
setlocale
strncmp
malloc
_exit
strtol
strcoll
_cexit
strtoul
iswctype
free
towupper
clock
__setusermatherr
__getmainargs
isupper
comdlg32
GetOpenFileNameW
GetFileTitleW
ChooseFontW
GetSaveFileNameA
PrintDlgExW
PageSetupDlgW
gdi32
GetSystemPaletteEntries
EndPath
SetViewportOrgEx
CreateSolidBrush
GetViewportOrgEx
CreateDIBitmap
SetBitmapBits
Polyline
GetNearestColor
StartDocW
SelectObject
ExtTextOutA
SaveDC
StretchDIBits
ScaleWindowExtEx
GetFontData
GetObjectW
GetNearestPaletteIndex
GetCurrentObject
CreateRectRgnIndirect
SetDIBColorTable
PtInRegion
SetMapMode
GetTextFaceW
EndDoc
StretchBlt
DPtoLP
ScaleViewportExtEx
CreateCompatibleBitmap
CreateBitmapIndirect
LineTo
GetBkMode
SetBkColor
LineDDA
ExtFloodFill
CreateEllipticRgnIndirect
CombineRgn
GetClipBox
CreatePatternBrush
CreateFontIndirectW
PolyBezier
LPtoDP
CreatePalette
GetTextExtentPoint32W
GetTextAlign
CreateBrushIndirect
SetPixel
user32
GetScrollInfo
GetNextDlgTabItem
InSendMessage
DrawMenuBar
WaitForInputIdle
IsCharUpperA
SetRect
GetClassInfoExA
SetClassLongW
FindWindowExA
UpdateWindow
InSendMessageEx
GetKeyState
GetMessageTime
EnableWindow
GetForegroundWindow
GetWindow
DefFrameProcW
OemToCharBuffA
SendInput
IsDialogMessageW
AdjustWindowRect
RemovePropW
GetUserObjectInformationA
DestroyIcon
GetDlgItemTextW
MapVirtualKeyW
GetMessagePos
SendDlgItemMessageA
AdjustWindowRectEx
GetSystemMetrics
GetWindowTextW
LoadStringA
IsCharAlphaW
ClientToScreen
LookupIconIdFromDirectory
SetWindowLongA
GetSysColor
IsCharLowerA
SetScrollPos
SetParent
GetKeyboardLayoutNameW
LoadMenuA
LoadCursorA
InvalidateRect
UnloadKeyboardLayout
CharNextA
GetMenuStringW
EndPaint
BeginDeferWindowPos
SetTimer
SetWindowTextW
DrawAnimatedRects
CreateCursor
PostMessageW
HideCaret
TileWindows
GetSubMenu
RegisterWindowMessageW
CheckMenuItem
GetDlgItemInt
PtInRect
CloseDesktop
GetMessageW
GetDlgItemTextA
InvertRect
ShowWindowAsync
InsertMenuA
AppendMenuA
mouse_event
ActivateKeyboardLayout
SetMenuItemBitmaps
DrawFrameControl
CascadeWindows
SetCursor
SendMessageTimeoutA
LoadImageA
SetDlgItemInt
IsZoomed
DispatchMessageW
DialogBoxIndirectParamA
CreateDialogIndirectParamW
TranslateAcceleratorW
GetDCEx
IsDlgButtonChecked
GetNextDlgGroupItem
GetLastActivePopup
CreateWindowExA
DragObject
DrawTextA
GetClientRect
DrawIcon
GetWindowLongA
AppendMenuW
SetActiveWindow
ArrangeIconicWindows
LoadAcceleratorsW
SetFocus
SwapMouseButton
DrawFocusRect
SendNotifyMessageW
GetWindowDC
PostThreadMessageW
LoadStringW
GetMenuItemInfoW
CreateIconFromResource
IsDialogMessageA
CreateDialogParamA
ReleaseDC
CharPrevA
ExitWindowsEx
ChildWindowFromPointEx
Exports
Exports
?RemoveFileOriginal@@YGXPAMIPAK]A
?RtlSemaphore@@YGPAHPAJG]A
Sections
.text Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.packed Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ