N:\xbkihwRvD\SywxRxWpRg\dxhBXwsCev.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab16cff3d30665783efdcfb6d5e8b23e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ab16cff3d30665783efdcfb6d5e8b23e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab16cff3d30665783efdcfb6d5e8b23e_JaffaCakes118
-
Size
147KB
-
MD5
ab16cff3d30665783efdcfb6d5e8b23e
-
SHA1
b4cf164d71f81f699840980034aff4878465d57c
-
SHA256
5b1b18994cd94f024659671b1d7ef2dad29d67c3c7dfa1980b553d624f469a09
-
SHA512
fb52af37a1884894324bddc7ac82fae4cf5c495715900a5c98c92d8437d2f02d4beb03db530c59c66472327b101e9e7e84474fcfd0cc8c32cbee99584cf93643
-
SSDEEP
3072:qgqt2RMhlccDUStFkK7FpHShUQkymX65vJfzV3jrI:qga2mrxD3FzvmUQkf613jrI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab16cff3d30665783efdcfb6d5e8b23e_JaffaCakes118
Files
-
ab16cff3d30665783efdcfb6d5e8b23e_JaffaCakes118.exe windows:5 windows x86 arch:x86
4071074f3c9c36947c7cd3d15ae002a1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetMessageTime
DefFrameProcA
AdjustWindowRectEx
GetKeyState
GetLastActivePopup
TranslateMessage
SetPropW
CopyRect
CharUpperBuffW
DragObject
FindWindowA
GetWindowModuleFileNameW
DrawFocusRect
SetCursor
TrackPopupMenuEx
GetMenuCheckMarkDimensions
RegisterClassA
GetMessageW
DialogBoxParamA
IntersectRect
DialogBoxIndirectParamA
AttachThreadInput
RegisterHotKey
LoadIconA
MonitorFromRect
ShowWindowAsync
wsprintfW
SendMessageA
DestroyCursor
MessageBoxW
wsprintfA
RegisterWindowMessageW
GetGUIThreadInfo
SwitchToThisWindow
LoadStringA
MapWindowPoints
GetCaretBlinkTime
GetUserObjectInformationW
CopyImage
DefDlgProcA
GetMenuStringA
LookupIconIdFromDirectory
DrawStateA
UpdateWindow
GetTopWindow
GrayStringW
SetWindowRgn
EnumThreadWindows
LoadImageA
ToUnicodeEx
LoadIconW
RemoveMenu
RegisterClassExW
GetWindowDC
GetMonitorInfoW
DestroyCaret
IsWindowEnabled
CharNextA
SetFocus
DialogBoxIndirectParamW
RegisterClassW
DestroyIcon
GetNextDlgTabItem
EnableWindow
EnumWindows
GetDlgItem
GetScrollRange
OpenDesktopW
GetMessageExtraInfo
IsCharLowerA
GetWindowPlacement
SetWindowLongW
GetClientRect
MapVirtualKeyA
InsertMenuItemW
SystemParametersInfoW
CheckMenuItem
GetDlgCtrlID
GetDCEx
SetMenuDefaultItem
IsRectEmpty
CharLowerA
SendMessageTimeoutA
InflateRect
LoadStringW
LoadAcceleratorsW
ShowWindow
ReleaseDC
GetClassLongA
DispatchMessageW
DestroyAcceleratorTable
SetMenuItemBitmaps
GetFocus
OemToCharA
SetScrollInfo
GetMessageA
LoadMenuA
ActivateKeyboardLayout
ShowOwnedPopups
wvsprintfA
LoadCursorW
GetClassInfoExW
EndDialog
GetKeyboardType
BringWindowToTop
EnableScrollBar
SendMessageW
GetMenuStringW
InSendMessage
GetNextDlgGroupItem
IsDialogMessageA
RemovePropW
WindowFromPoint
DrawTextW
GetMenuItemCount
ChangeMenuW
CharPrevA
DrawFrameControl
OpenInputDesktop
SystemParametersInfoA
PostMessageW
LoadAcceleratorsA
MapVirtualKeyW
CreatePopupMenu
shlwapi
StrToIntW
kernel32
AddAtomW
GlobalFlags
SetupComm
CopyFileW
MoveFileW
CreateDirectoryA
CloseHandle
FileTimeToLocalFileTime
FindClose
GetCommTimeouts
LockFile
OpenFileMappingW
SetFileAttributesW
LockResource
VerSetConditionMask
HeapAlloc
RaiseException
SetThreadContext
WaitForSingleObjectEx
GetFileSize
SetThreadExecutionState
GetUserDefaultLangID
CompareStringA
LCMapStringA
CreateFileMappingA
DeleteFileW
OpenEventW
GetComputerNameExW
FlushFileBuffers
CreateNamedPipeA
GetAtomNameW
OpenEventA
SetCommBreak
ReleaseSemaphore
SetUnhandledExceptionFilter
GetProcessHeap
GetComputerNameW
GetSystemDirectoryA
QueryPerformanceCounter
GetModuleFileNameA
GetThreadPriority
FindFirstFileW
QueryDosDeviceW
SearchPathW
GetTimeFormatA
DisconnectNamedPipe
GetCommModemStatus
CreateMailslotW
GetACP
WinExec
EnumResourceLanguagesA
HeapFree
EscapeCommFunction
lstrcmpiA
LoadLibraryA
GetProcAddress
SuspendThread
SetErrorMode
GetCurrentThreadId
comdlg32
GetSaveFileNameA
ChooseFontW
GetOpenFileNameW
ReplaceTextW
msvcrt
_controlfp
isupper
__set_app_type
mbstowcs
__p__fmode
clearerr
towupper
memset
wcstok
__p__commode
gets
_amsg_exit
toupper
fread
_initterm
_ismbblead
iswdigit
strspn
_XcptFilter
fclose
isspace
strncpy
qsort
wcstod
_exit
bsearch
wcslen
wcstol
strtoul
strtol
_cexit
strrchr
sscanf
floor
wcscspn
isprint
fgets
setlocale
localtime
gmtime
perror
isxdigit
clock
isdigit
vsprintf
__setusermatherr
puts
__getmainargs
Exports
Exports
?GenericOutputInfoYSUh@@YGK_KHE[D
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ