c:\hoaa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a07fcce2187d623a5b87e91538bef28c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a07fcce2187d623a5b87e91538bef28c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a07fcce2187d623a5b87e91538bef28c_JaffaCakes118
-
Size
784KB
-
MD5
a07fcce2187d623a5b87e91538bef28c
-
SHA1
74cd3a05909f316297fe1de302122f33bd2ccb92
-
SHA256
f9bb17bb6dd3fd75794ea8dcc6d835bc12a3e062d4bed559261f35ccf119140c
-
SHA512
18bbcad60b30593a1f6380e76abdb4b4292226d7c72d0f679d6214687fd35108fef779e7d16056eefbc8e9c3aab8fa070f25b1a55a134e2533a8015f0c126ed4
-
SSDEEP
24576:cbn1sDVmnOrTxf0k+BTKC39bGjWTuJLMwSq2LN4Y6QdTpVMM0dQY3+FsOfn6irBm:I1WlfH+BXkjWTuJLMwSq2LN4Y6QdTpVR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a07fcce2187d623a5b87e91538bef28c_JaffaCakes118
Files
-
a07fcce2187d623a5b87e91538bef28c_JaffaCakes118.exe windows:4 windows x86 arch:x86
8a58ba4a5d1bed793a1b4ead5645aa25
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
SetWindowOrgEx
CreatePatternBrush
StretchDIBits
DeleteObject
RealizePalette
Polyline
SetMapMode
CreateDCW
CreatePen
SetTextAlign
CreateRectRgn
Rectangle
GetDeviceCaps
CreateCompatibleBitmap
TextOutW
GetPaletteEntries
GetObjectW
MoveToEx
CreateSolidBrush
PolyBezier
CreateEllipticRgn
SetBkColor
Polygon
DeleteDC
advapi32
CloseServiceHandle
RegSetValueExW
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
RegDeleteValueA
comctl32
ord17
ImageList_GetIcon
ImageList_GetImageCount
InitCommonControlsEx
shell32
Shell_NotifyIconW
ExtractIconW
SHGetSpecialFolderLocation
SHGetMalloc
kernel32
GetStringTypeA
GetModuleFileNameA
SetHandleCount
GetStartupInfoA
FlushFileBuffers
GetStringTypeW
GetCommandLineW
GetSystemTime
HeapFree
SetFilePointer
LCMapStringW
InitializeCriticalSection
GetModuleFileNameW
CloseHandle
InterlockedIncrement
RtlUnwind
VirtualQuery
InterlockedExchange
GetTickCount
GetEnvironmentStrings
ExitProcess
GetModuleHandleA
GetStdHandle
GetModuleHandleW
QueryPerformanceCounter
SetEnvironmentVariableA
GetTimeZoneInformation
TlsAlloc
IsBadCodePtr
GetLastError
RaiseException
GetCurrentProcess
HeapAlloc
VirtualFree
UnhandledExceptionFilter
EnterCriticalSection
InterlockedDecrement
GetCPInfo
SetStdHandle
TerminateProcess
CompareStringA
GetVersion
LoadLibraryW
CreateMutexW
TlsGetValue
TlsSetValue
GetFileType
ReadFile
HeapCreate
DeleteCriticalSection
CompareStringW
GetProcAddress
LoadLibraryA
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
HeapDestroy
GetCurrentProcessId
LeaveCriticalSection
SetLastError
GetStartupInfoW
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
VirtualAlloc
SetUnhandledExceptionFilter
GetCurrentThreadId
MultiByteToWideChar
FreeEnvironmentStringsA
WideCharToMultiByte
GetLocalTime
LCMapStringA
user32
IntersectRect
UnhookWindowsHookEx
GetWindowThreadProcessId
GetSystemMetrics
LoadBitmapW
CopyImage
CreateWindowExW
OffsetRect
InsertMenuItemW
GetParent
GetMenuStringW
CloseClipboard
GetWindowRgn
LoadIconW
SetCapture
PeekMessageW
GetMenuItemID
RegisterClassW
GetMenuState
BeginDeferWindowPos
GetNextDlgGroupItem
DrawMenuBar
IsWindow
CallNextHookEx
LoadCursorW
GetKeyState
GetClientRect
FrameRect
CheckMenuItem
WindowFromPoint
SetClipboardData
RegisterClassExW
CharUpperW
GetDlgItem
GetClipboardData
SystemParametersInfoA
GetAsyncKeyState
GetActiveWindow
SubtractRect
EmptyClipboard
ShowWindow
GetWindowPlacement
EndPaint
IsWindowVisible
PostQuitMessage
IsIconic
WaitMessage
GetClassInfoW
DrawTextExW
SetFocus
LoadAcceleratorsW
LockWindowUpdate
OpenClipboard
GetWindowDC
DrawIconEx
TrackPopupMenu
DefWindowProcW
GetWindow
IsDialogMessageW
DispatchMessageW
TranslateMessage
ReleaseDC
MapWindowPoints
IsZoomed
SetMenuItemBitmaps
SetWindowPos
AdjustWindowRectEx
DrawEdge
InvalidateRect
BeginPaint
GetSubMenu
MessageBoxW
EnableWindow
GetFocus
MessageBeep
EndDeferWindowPos
IsWindowEnabled
DestroyCursor
UpdateWindow
MoveWindow
GetScrollPos
DestroyWindow
DestroyIcon
FillRect
CopyRect
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 468KB - Virtual size: 467KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ