N:\qrPodJnR\bXqoyOBaqhNlca\OcPjraA\aTmWuraassrad\PutdFhmv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a39ec23a671019ee07066c8aa94308cf_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a39ec23a671019ee07066c8aa94308cf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a39ec23a671019ee07066c8aa94308cf_JaffaCakes118
-
Size
83KB
-
MD5
a39ec23a671019ee07066c8aa94308cf
-
SHA1
493e3f48046d32acc1a3277ea1aca16e80be58e7
-
SHA256
b401f2df408d79735b98d9fa6fe09c90e3400bbad6a16f48c1411d72df98cb30
-
SHA512
e1357d2a075cf7c65d8a84464105fc9ca0658b36300308b11c651c02ae50a95cf48b645196b8114be1825afdf71ac55987779a82ea54bd14d4a912e33864174f
-
SSDEEP
1536:YAp7lQ7/a1d7E7ykWf3lPuDttrOsex5nTPRVzNzlvugTrB5IOOVRqqfxuL:np7lY/ao7N63lCttrPmtVzNzJugTHaOH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a39ec23a671019ee07066c8aa94308cf_JaffaCakes118
Files
-
a39ec23a671019ee07066c8aa94308cf_JaffaCakes118.exe windows:5 windows x86 arch:x86
afb2dd924a48d3dbaa75eb94decbc5b0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
PropertySheetW
DestroyPropertySheetPage
CreateToolbarEx
ImageList_GetIcon
ImageList_Write
ImageList_GetImageCount
msvcrt
realloc
_controlfp
towupper
strpbrk
__set_app_type
putchar
strtol
fclose
__p__fmode
swscanf
strspn
gmtime
__p__commode
_amsg_exit
_initterm
perror
wcscmp
atoi
_acmdln
strerror
fputs
exit
wcslen
_ismbblead
clearerr
isspace
strtoul
_XcptFilter
ungetc
_exit
iswalpha
wcsrchr
towlower
iswprint
printf
wcscpy
rand
bsearch
qsort
wcscat
_cexit
ftell
isdigit
wcsncpy
strstr
__setusermatherr
isxdigit
__getmainargs
gdi32
BitBlt
FillRgn
SetWindowOrgEx
GetTextExtentPoint32W
SetViewportExtEx
DeleteDC
SetRectRgn
PatBlt
GetTextMetricsA
SetAbortProc
PolyBezier
CreateCompatibleDC
GetPaletteEntries
Polyline
PtVisible
SetBitmapBits
CreateFontW
EndPage
GetRgnBox
SetBkColor
EnumFontFamiliesExW
StretchBlt
EnumFontFamiliesW
CreateFontIndirectW
GetTextExtentPointW
CreateBitmap
PtInRegion
GetTextColor
EndDoc
CreateCompatibleBitmap
StretchDIBits
GetTextCharsetInfo
ResizePalette
GetFontData
CreateDIBitmap
SetDIBColorTable
GetCharWidth32W
SetBkMode
ScaleViewportExtEx
LineTo
GetTextExtentPoint32A
RealizePalette
GetDIBits
RectVisible
GetNearestPaletteIndex
WidenPath
TextOutW
user32
GetWindow
TrackPopupMenuEx
ChildWindowFromPoint
EnableScrollBar
GetScrollInfo
CreateIconIndirect
CharNextW
InvalidateRect
SetLastErrorEx
InvertRect
DefFrameProcA
GetMessageA
InflateRect
ShowCaret
IsDialogMessageW
GrayStringW
MapVirtualKeyA
GetClassInfoA
OpenInputDesktop
EnumThreadWindows
TileWindows
KillTimer
SetWindowRgn
SendDlgItemMessageA
InvalidateRgn
ReplyMessage
GetDlgItem
GetDlgItemTextW
SwitchToThisWindow
CharUpperBuffA
GetClipCursor
DestroyIcon
CreateDialogIndirectParamW
CallWindowProcW
OemToCharA
IsWindowVisible
LoadAcceleratorsA
SetScrollPos
MapDialogRect
DrawTextW
SetClassLongW
RemovePropW
LoadMenuW
IsCharAlphaNumericW
LoadCursorA
GetMessagePos
AdjustWindowRect
CascadeWindows
ShowOwnedPopups
RedrawWindow
IsDlgButtonChecked
RemoveMenu
CreateDialogParamA
PostQuitMessage
GetUpdateRect
DestroyMenu
CreateMenu
RegisterClassW
CheckMenuRadioItem
CopyImage
LoadMenuA
UnloadKeyboardLayout
DefDlgProcA
GetKeyboardLayoutList
MessageBoxW
SetCursorPos
GetMenuItemRect
IsIconic
LoadStringW
DispatchMessageA
GetForegroundWindow
FrameRect
GetDlgCtrlID
IsZoomed
LoadStringA
GetScrollRange
CharPrevA
OffsetRect
ShowCursor
GetAsyncKeyState
ScrollWindow
ExitWindowsEx
GetWindowTextLengthW
InsertMenuA
DefFrameProcW
BeginPaint
SetPropW
GetClassLongA
GetMenuItemInfoW
ClientToScreen
IsWindowUnicode
IsWindow
OemToCharBuffA
SetWindowLongW
DestroyAcceleratorTable
GetKeyboardLayout
GetMenu
CharUpperW
ModifyMenuW
DispatchMessageW
SetMenu
SetParent
CharToOemA
AppendMenuA
GetWindowPlacement
GetAltTabInfoW
GetClassInfoExW
SetDlgItemInt
GetDlgItemInt
WindowFromPoint
DialogBoxParamW
GetParent
DrawIconEx
DeleteMenu
RegisterWindowMessageW
SetTimer
GetMenuItemCount
GetUpdateRgn
kernel32
VirtualAlloc
CreateDirectoryW
GetCommandLineW
CancelIo
CreateWaitableTimerA
CreateFileMappingA
LocalAlloc
GetCommConfig
GetHandleInformation
ConnectNamedPipe
InitializeCriticalSection
LCMapStringA
LoadLibraryW
GetStartupInfoW
GetTempPathA
GetModuleFileNameW
LocalUnlock
lstrcmpW
CompareStringA
CreateEventW
LockResource
LeaveCriticalSection
CopyFileW
FlushFileBuffers
GetACP
SetEvent
DeviceIoControl
TransactNamedPipe
OpenFileMappingW
GetWindowsDirectoryA
GetShortPathNameA
WaitForMultipleObjects
SetSystemTimeAdjustment
EnumSystemLocalesA
GetLocaleInfoW
SearchPathA
PulseEvent
GetCommandLineA
LocalReAlloc
VirtualQuery
FileTimeToSystemTime
GetCurrentThread
lstrcpyA
GetComputerNameExW
GetComputerNameW
SetLocalTime
MoveFileW
SetThreadLocale
EnumResourceLanguagesA
GlobalLock
GetComputerNameExA
CreatePipe
GetStdHandle
comdlg32
GetFileTitleW
PrintDlgW
PrintDlgExW
ChooseFontW
GetSaveFileNameW
Exports
Exports
?BitCounterArrayIdeDunAs@@YGKGE@Z
Sections
.text Size: 9KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE