d:\eksejqioz\dandeosoq.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a6b505c2b3e7c31416216dec9f830c9e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6b505c2b3e7c31416216dec9f830c9e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6b505c2b3e7c31416216dec9f830c9e_JaffaCakes118
-
Size
487KB
-
MD5
a6b505c2b3e7c31416216dec9f830c9e
-
SHA1
5b0079e6882ccd95597da34dbeabafbdb7b84d61
-
SHA256
b3a56e307a9794e8f2615bdfc4f347ee245c6cb3c975cb7720d2c65c0c1a80fa
-
SHA512
3b09527da0021e40fd65eff90c4b6533e8ae114564c2b7fa7feaa58e2c6a1cc8e74343d545f6f0003c85f019ad6468a969007d977628e5a8c36554a3a1f2083c
-
SSDEEP
6144:5M/T+2BF32IkjG/pVdNjcVIimw9FTDHWViExFbQlekrMJHoC5jyCiUKdtnhNLawp:SKgmnGrjc3HTD0b4xqWCSzny4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6b505c2b3e7c31416216dec9f830c9e_JaffaCakes118
Files
-
a6b505c2b3e7c31416216dec9f830c9e_JaffaCakes118.exe windows:4 windows x86 arch:x86
768f0b296819a40a2a8c0f93d404507b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetSaveFileNameA
FindTextW
wininet
InternetErrorDlg
comctl32
InitCommonControlsEx
user32
GetKBCodePage
RegisterClassExA
SetWindowWord
FlashWindow
GetClassLongA
EqualRect
RegisterClassA
DrawMenuBar
wsprintfA
SendNotifyMessageW
SetWindowPos
SetClassWord
IsCharAlphaNumericA
CharNextW
DdeUninitialize
SetWindowContextHelpId
SetCapture
InflateRect
ReleaseCapture
SetProcessWindowStation
ModifyMenuA
PostMessageA
GetCursorInfo
GetLastActivePopup
DefDlgProcW
ReleaseDC
kernel32
QueryPerformanceCounter
InterlockedExchange
VirtualFree
EnumSystemLocalesA
GetConsoleCP
GetModuleFileNameA
GetOEMCP
TlsAlloc
VirtualQuery
GetCPInfo
LoadLibraryW
RtlUnwind
GetConsoleTitleW
LCMapStringA
VirtualLock
WriteFile
SetEndOfFile
FlushFileBuffers
GetCommandLineA
InitializeCriticalSection
GetStringTypeW
CompareStringA
GetLocaleInfoW
GetFileType
EnumDateFormatsW
FileTimeToDosDateTime
HeapDestroy
LoadLibraryA
GetVersionExA
ReadFile
GlobalLock
SetEnvironmentVariableA
IsValidCodePage
IsValidLocale
GetStdHandle
GetStartupInfoA
SetLastError
GetTickCount
VirtualProtect
GetCurrentProcessId
FreeEnvironmentStringsW
IsBadWritePtr
GetFileAttributesExW
GetLocaleInfoA
GetSystemDefaultLCID
GetUserDefaultLCID
HeapCreate
GetPrivateProfileSectionW
VirtualAlloc
GetStringTypeA
GetLastError
GetExitCodeThread
GetEnvironmentStringsW
MultiByteToWideChar
Sleep
EnterCriticalSection
GetProfileIntW
SetThreadContext
GetTimeFormatA
CompareStringW
GetModuleHandleA
WaitCommEvent
GetSystemInfo
WideCharToMultiByte
ExitThread
lstrcpynA
TerminateProcess
OpenMutexA
GetSystemTimeAsFileTime
GetCurrentThread
HeapAlloc
GetDateFormatA
InterlockedDecrement
TlsFree
GetTimeZoneInformation
LocalShrink
FreeEnvironmentStringsA
HeapReAlloc
GetFileAttributesA
CloseHandle
UnhandledExceptionFilter
TlsGetValue
GetCurrentProcess
ExitProcess
CreateMutexA
GetProcAddress
HeapFree
SetHandleCount
DeleteCriticalSection
HeapSize
GetEnvironmentStrings
TlsSetValue
LeaveCriticalSection
LCMapStringW
GetCurrentThreadId
SetFilePointer
GetACP
SetStdHandle
Sections
.text Size: 334KB - Virtual size: 334KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ