c:\eruw\tfpuo\cxrj\mfzxffor.PDB
Static task
static1
Behavioral task
behavioral1
Sample
a785c79ef92e8d0cea3132433acca5e9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a785c79ef92e8d0cea3132433acca5e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a785c79ef92e8d0cea3132433acca5e9_JaffaCakes118
-
Size
279KB
-
MD5
a785c79ef92e8d0cea3132433acca5e9
-
SHA1
4804c01e5e72cf04d2f2387216713c9a6190e32e
-
SHA256
60f43b9012b0762015ace93580777d49d04643c531eaa0cb38c8f625512cd771
-
SHA512
1bc5efd7d65b4584a1377191c2e83bc7ec40e711cda2eb80b928b7ecfbcc60ce6ff249bacf2405b9cc3b7641dbc066d6e86757933347e5effc2bbcf17d225afa
-
SSDEEP
6144:d4INuBjiGilD14kcyyGYFQAF/iQiDTgTfaVU6n:mUuEGEx41yyGqQ4/iH0aKg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a785c79ef92e8d0cea3132433acca5e9_JaffaCakes118
Files
-
a785c79ef92e8d0cea3132433acca5e9_JaffaCakes118.exe windows:4 windows x86 arch:x86
b8adbaaff92d64b8cf43c06766a470cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
kernel32
LeaveCriticalSection
LCMapStringA
GetStartupInfoW
WriteConsoleInputW
SetHandleCount
FileTimeToLocalFileTime
GetFileAttributesExW
WriteFile
GetLocaleInfoA
LoadLibraryW
GetTimeFormatA
TlsFree
ReadFile
RtlUnwind
TerminateProcess
QueryPerformanceCounter
SetConsoleOutputCP
CloseHandle
CompareStringW
GetWindowsDirectoryA
lstrcmpA
SetComputerNameW
GetSystemInfo
OpenEventA
HeapAlloc
SetLastError
GetCommandLineW
SetEnvironmentVariableA
GetStartupInfoA
GetTimeZoneInformation
TlsAlloc
GetStdHandle
CreateMutexA
LCMapStringW
GetOEMCP
GetStringTypeW
lstrcmpW
UnhandledExceptionFilter
GetVersionExA
HeapDestroy
InterlockedExchange
GetACP
GetSystemDirectoryA
VirtualFree
GetModuleFileNameA
GetUserDefaultLCID
FreeEnvironmentStringsA
GetCurrentThread
GetCurrentProcess
VirtualQuery
EnumSystemLocalesA
lstrcpynA
GetLocaleInfoW
LoadLibraryA
HeapFree
GetCurrentProcessId
SetStdHandle
EnterCriticalSection
GetProcAddress
GetModuleHandleA
HeapReAlloc
GetDateFormatA
InterlockedExchangeAdd
GetEnvironmentStrings
WaitForDebugEvent
WideCharToMultiByte
GetModuleFileNameW
GetCurrentThreadId
IsValidLocale
ExitProcess
SetFilePointer
CompareStringA
GetLastError
HeapCreate
TlsSetValue
MultiByteToWideChar
FlushFileBuffers
GetStringTypeA
IsBadWritePtr
GetCPInfo
GetEnvironmentStringsW
GetFileType
InitializeCriticalSection
DeleteCriticalSection
VirtualProtect
VirtualAlloc
OpenMutexA
GetCommandLineA
HeapSize
GlobalAddAtomA
GetSystemTimeAsFileTime
GetTickCount
TlsGetValue
FreeEnvironmentStringsW
IsValidCodePage
user32
ChangeDisplaySettingsW
GetUserObjectInformationA
UnhookWindowsHook
SetWindowLongA
GetMenuBarInfo
MonitorFromWindow
AppendMenuA
SetMenuDefaultItem
MessageBoxW
LoadKeyboardLayoutA
CreateWindowExA
RegisterClassExA
DdeConnectList
RegisterClassA
ShowWindow
Sections
.text Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ