k:\cqitaelui\leoaexy.PDB
Static task
static1
Behavioral task
behavioral1
Sample
ab4c7d77d2cedf551106f9a5087f12cb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab4c7d77d2cedf551106f9a5087f12cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab4c7d77d2cedf551106f9a5087f12cb_JaffaCakes118
-
Size
361KB
-
MD5
ab4c7d77d2cedf551106f9a5087f12cb
-
SHA1
efb317c1b0a05034114871c705e0d683d5ceead5
-
SHA256
fa1fcac48696c2b7e170c1a92a5c590ea144b9c9088fc5fe5e12e1da926e8929
-
SHA512
f7d26bb509baa012c56e40ec8f01dd6272a6f7a74bac1d8c9bacb38b67be306f905c5c7e1bc7b7d264475e68cb80d536650726c5d93a81a05141a6587de4c492
-
SSDEEP
6144:YioyG+JR0x+pj8kzNBHw8YbNU5kZtn9bvvsWXReVcXOVsYmFklVom8:Yf+R00ddxBHw8YbNU5kTnpvsWbUw2h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab4c7d77d2cedf551106f9a5087f12cb_JaffaCakes118
Files
-
ab4c7d77d2cedf551106f9a5087f12cb_JaffaCakes118.exe windows:4 windows x86 arch:x86
bb3bd46d88d59f57ded8c1c888356581
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LCMapStringW
GetCurrentThread
GetModuleHandleA
WideCharToMultiByte
HeapDestroy
GetTimeZoneInformation
GetCurrentProcess
SetStdHandle
GlobalDeleteAtom
CompareStringA
TlsGetValue
LCMapStringA
LeaveCriticalSection
WaitForMultipleObjectsEx
GetStartupInfoA
GetCurrentThreadId
GetUserDefaultLCID
lstrcpy
GetTickCount
GetCommandLineA
RtlUnwind
SetFilePointer
OpenMutexA
GetDateFormatA
TlsAlloc
ExitProcess
GetACP
HeapFree
FreeEnvironmentStringsA
WriteFile
GetSystemInfo
GetLocaleInfoW
GetStringTypeA
GetFileType
GetStringTypeW
GetTimeFormatA
InterlockedExchange
GetLocaleInfoA
SetHandleCount
FlushFileBuffers
GetModuleFileNameA
GetCurrentProcessId
LoadLibraryA
TlsSetValue
QueryPerformanceCounter
CreateMutexA
SetEnvironmentVariableA
IsBadWritePtr
GetWindowsDirectoryA
InitializeCriticalSection
HeapAlloc
EnumSystemLocalesA
HeapSize
GetSystemTimeAsFileTime
DeleteCriticalSection
VirtualQuery
TlsFree
GetCPInfo
GetEnvironmentStrings
MultiByteToWideChar
HeapCreate
VirtualFreeEx
CompareStringW
GetStdHandle
CreateToolhelp32Snapshot
GetOEMCP
UnhandledExceptionFilter
FreeEnvironmentStringsW
EnterCriticalSection
GetConsoleCursorInfo
VirtualFree
HeapReAlloc
SetLastError
GetEnvironmentStringsW
CloseHandle
VirtualProtect
TerminateProcess
SetSystemTime
GetLastError
IsValidCodePage
GetVersionExA
GetProcAddress
WaitForSingleObjectEx
IsValidLocale
VirtualAlloc
ReadFile
user32
DdeUnaccessData
SendNotifyMessageA
TranslateMDISysAccel
GetWindowInfo
DdeGetData
RegisterClassA
DrawTextExW
SetMenuItemInfoW
DefMDIChildProcW
CreateIcon
InternalGetWindowText
CharToOemA
OpenDesktopW
EnumDisplayDevicesA
DdeCreateDataHandle
MoveWindow
GetMenuCheckMarkDimensions
DrawEdge
EnumPropsExA
EndTask
RegisterClassExA
GetCursorPos
GetDlgItem
SetWindowPlacement
GetMenuState
FlashWindow
GetDialogBaseUnits
advapi32
RegConnectRegistryA
CryptEncrypt
comdlg32
PageSetupDlgW
GetFileTitleA
PrintDlgA
comctl32
InitCommonControlsEx
gdi32
ExtTextOutA
GdiPlayJournal
DeviceCapabilitiesExW
SetWindowExtEx
EndDoc
CreateEllipticRgn
GetCharacterPlacementW
GetKerningPairsW
GetStretchBltMode
SetMetaRgn
SetDeviceGammaRamp
SetViewportExtEx
CreatePen
AddFontResourceA
GdiPlayScript
SetFontEnumeration
CreateICW
PlayEnhMetaFile
PtInRegion
PtVisible
shell32
ShellAboutW
SHGetSpecialFolderPathA
ShellExecuteW
ExtractIconW
ShellExecuteExA
Sections
.text Size: 220KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ