G:\gcoymPsht\pCrCJWwupn\cJmlwuNjHY\XddlAus\gkobhnHPyk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab8ded591edae6e18bc4981cff3e2ab0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab8ded591edae6e18bc4981cff3e2ab0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab8ded591edae6e18bc4981cff3e2ab0_JaffaCakes118
-
Size
181KB
-
MD5
ab8ded591edae6e18bc4981cff3e2ab0
-
SHA1
4dde8130b08cc39b9d66935742168c8f9ce97360
-
SHA256
c548cbf199a47a0ce32ad8422712b534042276a16089da97017dd42b20f20889
-
SHA512
fc7862c80444b59e22711b547d3d782cfe16a1d04c4224128bd0171aaaa321af5d3b269a29abf0a7a9ca6c3641c61bed28bc79f436102277df5f7e702cc49438
-
SSDEEP
3072:2VQPT81Uc2jMmhmzZ9AWowx6nql+mJ4JntKyOMglUu9D0s6dvz1CjmAaukBDONTb:MQb1cKMcmd9xoCJQoHDT9G1CsusDaTuS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab8ded591edae6e18bc4981cff3e2ab0_JaffaCakes118
Files
-
ab8ded591edae6e18bc4981cff3e2ab0_JaffaCakes118.exe windows:5 windows x86 arch:x86
e9a8287195234049ac52b945119d9fb5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
LoadMenuA
SetForegroundWindow
IsWindowVisible
CreateAcceleratorTableW
DrawTextExW
CheckMenuItem
HiliteMenuItem
DrawMenuBar
GetClipCursor
GetIconInfo
AdjustWindowRect
CharUpperBuffA
InvalidateRect
CreateWindowExW
CreateIconIndirect
GetClassInfoW
MessageBoxW
LoadCursorA
DialogBoxIndirectParamW
DefFrameProcW
CharNextA
CharUpperW
GetAsyncKeyState
GetForegroundWindow
GetUpdateRgn
DialogBoxParamW
SendInput
GetUpdateRect
GetKeyboardType
LookupIconIdFromDirectory
CharUpperBuffW
GetMessageW
SendDlgItemMessageA
WindowFromPoint
CharPrevW
GetKeyNameTextW
IsDlgButtonChecked
GetClassInfoExA
GetPropW
IsZoomed
RegisterClassExA
VkKeyScanW
GetActiveWindow
ScrollWindowEx
OemToCharA
BeginPaint
PostThreadMessageW
SetLastErrorEx
GetSubMenu
SetActiveWindow
MapWindowPoints
GetCursorPos
SendMessageW
WaitMessage
ScrollWindow
SwitchToThisWindow
InflateRect
GetDCEx
RegisterWindowMessageW
RemovePropW
GetClassNameW
mouse_event
EnableScrollBar
ModifyMenuW
LoadMenuW
SendMessageA
SendDlgItemMessageW
GetParent
ShowWindow
CheckDlgButton
GetClientRect
GetDlgItem
GetWindowTextA
ShowWindowAsync
InsertMenuA
DestroyAcceleratorTable
GetMessagePos
OpenInputDesktop
GetNextDlgTabItem
DefWindowProcA
DefWindowProcW
GetMenuItemInfoW
InsertMenuW
IsCharLowerA
GetScrollRange
CopyAcceleratorTableW
SetMenuItemBitmaps
GetMonitorInfoW
TileWindows
InsertMenuItemW
SetCaretPos
LoadAcceleratorsW
PeekMessageA
TranslateAcceleratorA
SetWindowRgn
GetDlgItemInt
keybd_event
DestroyWindow
DefDlgProcW
DeleteMenu
InvalidateRgn
DrawTextW
ActivateKeyboardLayout
SetWindowLongA
InSendMessageEx
GetDoubleClickTime
GetWindowPlacement
wsprintfW
SystemParametersInfoW
MoveWindow
CheckRadioButton
ScreenToClient
SendNotifyMessageW
ChildWindowFromPoint
DestroyCaret
MapDialogRect
SetMenu
GetWindow
SetParent
AppendMenuA
DrawIcon
shlwapi
PathIsUNCA
msvcrt
memset
setlocale
puts
wcstok
_controlfp
__set_app_type
calloc
iswalpha
floor
wcscoll
__p__fmode
__p__commode
wcscspn
fseek
sscanf
wcstoul
tolower
_amsg_exit
fgetc
_initterm
isupper
_ismbblead
isdigit
fputs
system
ftell
toupper
towupper
strerror
malloc
strtoul
printf
strtol
_XcptFilter
wcsncmp
srand
realloc
wcstol
vsprintf
_exit
isprint
isxdigit
gmtime
perror
free
_cexit
strtok
__setusermatherr
__getmainargs
putchar
kernel32
GetLocaleInfoW
OpenEventA
RemoveDirectoryA
GetACP
GlobalFindAtomW
Sleep
GetLocaleInfoA
ClearCommBreak
GetTempPathW
RaiseException
lstrcpyA
HeapCreate
TlsSetValue
CreatePipe
LocalReAlloc
SearchPathA
GetCommConfig
GetWindowsDirectoryW
GlobalMemoryStatus
LocalFree
GlobalSize
WaitForSingleObjectEx
EnumResourceNamesW
CreateEventW
CompareStringA
OpenSemaphoreW
HeapSize
TransactNamedPipe
MoveFileA
LockResource
GetCommTimeouts
SizeofResource
DeviceIoControl
GetSystemDefaultLangID
GetTimeFormatA
FindFirstFileW
TlsFree
FindFirstChangeNotificationW
VirtualProtect
GetSystemDirectoryA
LoadLibraryW
DeleteFileW
GetFileAttributesExA
DeleteCriticalSection
GlobalCompact
GetFileType
GetDateFormatW
GetThreadPriority
GetVersionExW
FormatMessageA
CreateFileA
SetFileAttributesW
EnterCriticalSection
LoadLibraryExW
OpenFile
Exports
Exports
?ForwardControlItem@@YGK_KK:O
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ips1 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ips2 Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.read Size: 512B - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ips3 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ips4 Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ