h:\sogouime36\Bin\SogouInput\ErrorReport.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab938b8cc828edbcf1599a313f8ad8f2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab938b8cc828edbcf1599a313f8ad8f2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab938b8cc828edbcf1599a313f8ad8f2_JaffaCakes118
-
Size
207KB
-
MD5
ab938b8cc828edbcf1599a313f8ad8f2
-
SHA1
400f7d59e35ffd7e01644f18aa19938b7c3e7105
-
SHA256
5b3ee3a509bd067aab7068909f4dac0708979a8504f7763d6cf19247266247cb
-
SHA512
2e8c745d2951e00f4ad5a2aaf41333d7d00ca524a36f6b7589dbc8fd73e466bd7743c504bdcc235533e432b221365dd32a6d3bdb9483757c0da1b2ce67b1beb1
-
SSDEEP
3072:nfDu7/d3bawR9YpFL7JpGIKjTBffAg0FuLb+SOSteUxTr:rk5bbEj+jTBHAO/+SM0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab938b8cc828edbcf1599a313f8ad8f2_JaffaCakes118
Files
-
ab938b8cc828edbcf1599a313f8ad8f2_JaffaCakes118.exe windows:4 windows x86 arch:x86
a4260edebf7bcb17beaf82a479259316
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCloseHandle
InternetSetOptionW
InternetOpenW
InternetOpenUrlW
kernel32
Process32NextW
GetCurrentProcessId
Process32FirstW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
OpenFileMappingW
MultiByteToWideChar
FindClose
FindFirstFileW
CreateDirectoryW
LoadLibraryW
FreeLibrary
Sleep
OpenEventW
FlushFileBuffers
CreateMutexW
ReleaseMutex
OpenMutexW
GetSystemTimeAsFileTime
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
TerminateProcess
GetCommandLineW
RaiseException
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetTempPathW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
GetProcAddress
VirtualAlloc
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetTimeZoneInformation
GetFullPathNameW
GetCurrentDirectoryA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
LoadLibraryA
InitializeCriticalSection
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetDriveTypeA
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateToolhelp32Snapshot
GetCurrentProcess
ExitThread
CreateProcessW
CreateFileW
GetModuleFileNameW
WriteFile
SetFilePointer
CreateThread
WaitForMultipleObjects
FormatMessageW
LocalFree
SetLastError
CreateEventW
DuplicateHandle
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
GetTickCount
GetModuleHandleW
FreeEnvironmentStringsW
GetSystemInfo
SetEvent
CloseHandle
WaitForSingleObject
GetLastError
ResetEvent
IsDebuggerPresent
QueryPerformanceCounter
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityInfo
SetNamedSecurityInfoW
BuildExplicitAccessWithNameW
GetSecurityDescriptorSacl
SetEntriesInAclW
SetSecurityInfo
RegSetValueExW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegQueryValueW
imm32
ImmDisableIME
user32
MessageBoxW
CloseClipboard
SetClipboardData
OpenClipboard
EmptyClipboard
DrawTextW
GetCursorPos
SubtractRect
GetLastInputInfo
FindWindowW
BeginPaint
PtInRect
CreateWindowExW
GetSystemMetrics
EndPaint
TranslateMessage
DestroyWindow
GetForegroundWindow
CloseWindow
SetCursor
AdjustWindowRect
RegisterClassExW
SetTimer
GetMonitorInfoW
OffsetRect
GetWindowRect
DefWindowProcW
IntersectRect
MonitorFromRect
GetMessageW
InvalidateRect
MonitorFromPoint
PostQuitMessage
GetWindowLongW
DispatchMessageW
SetWindowLongW
LoadCursorW
SetWindowPos
gdi32
BitBlt
CreateCompatibleDC
CreateSolidBrush
CreateFontIndirectW
GetStockObject
SetTextColor
SetBkMode
DeleteObject
CreateCompatibleBitmap
Rectangle
SetViewportOrgEx
DeleteDC
CreatePen
SelectObject
shell32
ShellExecuteW
SHGetSpecialFolderPathW
Sections
.text Size: 128KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE