offcln.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a8e25ee663521aaf6825003cc7c0fbf9_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a8e25ee663521aaf6825003cc7c0fbf9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a8e25ee663521aaf6825003cc7c0fbf9_JaffaCakes118
-
Size
127KB
-
MD5
a8e25ee663521aaf6825003cc7c0fbf9
-
SHA1
52c52f307ec0c12f3accaa17f7a87307b8e3ee68
-
SHA256
521bb0a6acf5017fec938df2c61ae57a328c2b713a757f52370f3a1df0eb14af
-
SHA512
93842544b88b838dd60f9257d001c335e0946fef38de7ee09f990257c837bce5d501623f9747b72f2b5b5befb9789c7cc9399010ed496e632af48537cfcba44c
-
SSDEEP
3072:I6shmMOMhflYCaYuuZwZEgFcKQuLU/m18wBuE9Jvc:rW9ZwOocSLU1wBpc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8e25ee663521aaf6825003cc7c0fbf9_JaffaCakes118
Files
-
a8e25ee663521aaf6825003cc7c0fbf9_JaffaCakes118.exe windows:4 windows x86 arch:x86
f4635f03077e9f854bae23ec7e98e71e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
SetTextColor
DeleteDC
BitBlt
GetObjectA
SelectObject
CreateCompatibleDC
CreateSolidBrush
SetBkMode
GetTextExtentPointA
DeleteObject
CreateFontIndirectA
GetStockObject
EnumFontFamiliesExA
AbortDoc
EndDoc
EndPage
TextOutA
StartPage
StartDocA
SetAbortProc
GetDeviceCaps
GetTextMetricsA
ExtTextOutA
SetBkColor
kernel32
lstrlenW
GlobalAlloc
SizeofResource
LoadResource
FindResourceA
GetVersion
lstrlenA
MultiByteToWideChar
GlobalFree
lstrcmpiA
CloseHandle
WriteFile
CreateFileA
LocalFree
FormatMessageA
GetLastError
EnumResourceNamesA
GetVersionExA
SetCurrentDirectoryA
GetModuleFileNameA
GetTickCount
GetStartupInfoA
GetModuleHandleA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetFilePointer
EnumResourceLanguagesA
user32
ReleaseDC
GetDC
CharPrevA
DispatchMessageA
TranslateMessage
IsDialogMessageA
PeekMessageA
DialogBoxIndirectParamA
LoadBitmapA
MessageBoxA
IsDlgButtonChecked
DialogBoxParamA
CreateDialogParamA
CharNextA
GetWindowLongA
SetWindowLongA
LoadCursorA
EndDialog
SetCursor
LoadIconA
LoadImageA
DestroyWindow
GetParent
GetDesktopWindow
ClientToScreen
GetWindowRect
ScreenToClient
MoveWindow
GetWindowTextA
DrawTextA
BeginPaint
FillRect
EndPaint
CallWindowProcA
GetSysColor
LoadStringA
EnableWindow
SendMessageA
SetFocus
DrawFocusRect
RedrawWindow
SetDlgItemTextA
CheckRadioButton
ShowWindow
SendDlgItemMessageA
GetDlgItem
GetClientRect
msvcrt
_controlfp
memmove
isdigit
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_vsnprintf
comctl32
ord17
comdlg32
PrintDlgA
GetSaveFileNameA
oclean
InitDetection
HfOpenOpc
FCheckIfTargetIsRemove
AddFileSizeToSavingsVar
DoErrOOMDlg
FIsWord97ReallyWord98
MemCopy
SetMigrationLcid
FDoneWithPszFiles
FInitOPCDataFileBuf
GetFileBufRead
FDetectTargetStates
SetSourceDir
UintDetectAndMigrate
FDetermineCleanupActions
FSetTarget
FNoDarwinRemoval
FIsOtherListEmpty
FExecuteCleanupActions
FEarlyAppDetection
DoErrWriteDlg
OPCGetShellFolder
FreeAllBuffers
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE