T:\zhmKUutgxpvdql\bmqwoeqhwdbtp\xBnskqdefKkOuS\fFnbGrOPs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a4c6d9ddf596f79e5b34b98ab9279b92_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a4c6d9ddf596f79e5b34b98ab9279b92_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4c6d9ddf596f79e5b34b98ab9279b92_JaffaCakes118
-
Size
145KB
-
MD5
a4c6d9ddf596f79e5b34b98ab9279b92
-
SHA1
09e364bd245b842c2e8cccb1edaf559bfbaf8eeb
-
SHA256
4515d3b56290966a822d152c9267d5b1e2caa137a9954dac1bf98bbf0b1e0850
-
SHA512
c1043ae860e7673b56d4b3b43d177b055495902d76c7786f92d9cc3ff40dbdba8f38864ffa79b5901015c50f5f87c8c68072beb04ca3ae568bab188a25f0214c
-
SSDEEP
3072:u4+Gsiw9IW8oO3WOr0fEgreI73NaZpjEnwdIQR5jW1wGXz:u4OiBW3OL0fEgjUZew+o5Y/X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4c6d9ddf596f79e5b34b98ab9279b92_JaffaCakes118
Files
-
a4c6d9ddf596f79e5b34b98ab9279b92_JaffaCakes118.exe windows:5 windows x86 arch:x86
36b9c18e31d63f0ae48528d759446610
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
ord157
ord29
StrStrIA
comdlg32
GetFileTitleW
ReplaceTextW
FindTextW
msvcrt
_controlfp
__set_app_type
swscanf
__p__fmode
system
printf
fclose
isdigit
__p__commode
_amsg_exit
wcstombs
wcsncmp
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
ftell
wcspbrk
_cexit
__setusermatherr
strrchr
__getmainargs
gmtime
realloc
strstr
user32
SetParent
GetClassInfoW
DefFrameProcA
MessageBoxW
MapVirtualKeyA
SetActiveWindow
CheckMenuItem
wvsprintfA
SetScrollInfo
CreateMenu
DrawTextA
GetDlgItemTextA
GetClassInfoExW
wsprintfW
GetIconInfo
SetRect
CreateCaret
SetClassLongW
DestroyCaret
DeferWindowPos
SetMenu
GetFocus
GetDlgCtrlID
ScreenToClient
SetWindowLongW
DrawStateA
DestroyWindow
SetWindowPos
wsprintfA
mouse_event
ShowScrollBar
AdjustWindowRectEx
AppendMenuW
CharUpperBuffA
CreateWindowExW
EnumWindows
FindWindowExA
ToUnicodeEx
CharToOemW
FillRect
GetNextDlgGroupItem
CharNextA
CopyAcceleratorTableW
SetMenuItemBitmaps
GetKeyState
advapi32
OpenBackupEventLogW
kernel32
SetEvent
SuspendThread
SetWaitableTimer
ResumeThread
CreateFileMappingA
SetNamedPipeHandleState
VirtualProtect
ReleaseSemaphore
GetTimeFormatA
DeleteCriticalSection
GetFileInformationByHandle
lstrcpynW
GetTempFileNameW
FindFirstFileA
VerifyVersionInfoW
LocalSize
SetHandleInformation
lstrcpynA
CopyFileW
lstrlenW
GetComputerNameExW
LocalFree
gdi32
SetDIBits
CreateFontW
GetRgnBox
SelectPalette
GetTextExtentPointW
SetWindowOrgEx
GetSystemPaletteEntries
GetDIBColorTable
BitBlt
GetClipBox
GetNearestColor
StartPage
WidenPath
LineDDA
SetBitmapDimensionEx
GetPixel
CreateBitmapIndirect
SetStretchBltMode
GetObjectA
Exports
Exports
?IsArgumentW@@YGXFI*Z
?Screen@@YGGPADFG*Z
?CallKeyNameExW@@YGKPAKFPAGPAF*Z
?SetDate@@YGEHGPADK*Z
?SendFilePathNew@@YGHFHGPAJ*Z
?IsMessageA@@YGIPAJDMG*Z
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.etdir Size: 512B - Virtual size: 344B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itdir Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vtdir Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ptdir Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.stdir Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ