R:\gpUUcUpihJj\tVhtFYAPM\bpHbphqzxxuzvz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a34b317dcd497ff9ffb0e226480b724e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a34b317dcd497ff9ffb0e226480b724e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a34b317dcd497ff9ffb0e226480b724e_JaffaCakes118
-
Size
165KB
-
MD5
a34b317dcd497ff9ffb0e226480b724e
-
SHA1
bba90e628cacbf1fd56cd54304ab728c9c92bcfe
-
SHA256
8884989b417b4cc5516c10578d54cf0fc7f8cec19b201fdf7b41c1f931c1a33f
-
SHA512
e47ba077c14eb4cc4c0d12008b419099ce3a57d6fd603820b5054f230fee142efbf62f1a64710f2f60ace9753c171880f54f5de253107b56aaeb2c1b877a6b4f
-
SSDEEP
3072:kEaEEu+nIoicWBipWqTwlJwiINFaA05j46yZFF+C:nn+nAhUp5TuRI2A0y6yJP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a34b317dcd497ff9ffb0e226480b724e_JaffaCakes118
Files
-
a34b317dcd497ff9ffb0e226480b724e_JaffaCakes118.exe windows:5 windows x86 arch:x86
dc2f904e64bedc3b055b56af52e3c955
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
IsWindowEnabled
GetClientRect
GetForegroundWindow
SetFocus
OffsetRect
AdjustWindowRect
IsWindow
GetTopWindow
kernel32
GetCompressedFileSizeW
GetFileType
HeapReAlloc
GetVersionExA
GetSystemWindowsDirectoryW
GetShortPathNameW
ReleaseSemaphore
MoveFileA
GetSystemDirectoryW
UnmapViewOfFile
DisconnectNamedPipe
GetCurrentThreadId
CompareFileTime
SetTimerQueueTimer
ntdll
RtlCompareMemory
Exports
Exports
?InsertFil
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fxc Size: - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fx Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ