k:\dajbtylyte\cwgkztpom\emo\oaj\qqzonqcis\qodedsqo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
abcbbff1f58b0f2c08d4aae676b33b70_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
abcbbff1f58b0f2c08d4aae676b33b70_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
abcbbff1f58b0f2c08d4aae676b33b70_JaffaCakes118
-
Size
521KB
-
MD5
abcbbff1f58b0f2c08d4aae676b33b70
-
SHA1
fdedc423e2fa683b08d8b09368ab31f36a8ba090
-
SHA256
53a56b6b13e327e3dcf007610cce718bf228bfa38d661c7b2bfb3011d5d241f9
-
SHA512
67b393a5671bae03e370e2623a9e6f60f837a5abe3782044f4cdc52c837d3a17c0fe2e85fc8b7dfddc1052e13c8adf559fcd5249eb7f5947105bb90f900bb2bc
-
SSDEEP
12288:rR/DBt7T+umajDzZupZNGi/DkOyOJd7/ZjJWnXi0:d/DbyumsENGgDkOBdPWnD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abcbbff1f58b0f2c08d4aae676b33b70_JaffaCakes118
Files
-
abcbbff1f58b0f2c08d4aae676b33b70_JaffaCakes118.exe windows:4 windows x86 arch:x86
8b7a86caaa13746c965793fc42125b03
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
HeapAlloc
HeapCreate
GetStartupInfoA
GetSystemTime
GetModuleHandleA
GetCurrentThread
GetTickCount
LoadLibraryA
ReadFile
CreateMutexA
HeapDestroy
SetFilePointer
TlsAlloc
VirtualFree
CompareStringW
SetLastError
GetModuleFileNameA
GetLastError
GetCurrentProcessId
LeaveCriticalSection
TerminateProcess
GetCurrentThreadId
GlobalUnfix
InterlockedDecrement
ExitProcess
CloseHandle
CreateDirectoryA
GetStdHandle
HeapFree
GetProcessHeap
TlsGetValue
InitializeCriticalSection
GetCommandLineA
OpenMutexA
LCMapStringW
GetTimeZoneInformation
QueryPerformanceCounter
EnumCalendarInfoW
GetLocalTime
VirtualQuery
SetEnvironmentVariableA
FlushFileBuffers
CompareStringA
TlsSetValue
GetCurrentProcess
TlsFree
IsBadWritePtr
EnterCriticalSection
GetFileType
HeapReAlloc
LCMapStringA
SetHandleCount
GetACP
GetSystemTimeAsFileTime
GetOEMCP
GetStringTypeA
SetStdHandle
FreeEnvironmentStringsA
GetStringTypeW
InterlockedIncrement
DeleteCriticalSection
GetVersion
UnhandledExceptionFilter
WriteFile
GetCPInfo
InterlockedExchange
WideCharToMultiByte
FreeEnvironmentStringsW
MultiByteToWideChar
GetEnvironmentStringsW
VirtualAlloc
GetEnvironmentStrings
RtlUnwind
comctl32
InitCommonControlsEx
user32
RegisterClassA
CascadeChildWindows
DefWindowProcW
SetPropW
IsClipboardFormatAvailable
RegisterClassExA
SwapMouseButton
gdi32
SetDIBitsToDevice
ExtTextOutA
ModifyWorldTransform
GetClipBox
GetLogColorSpaceW
EnumMetaFile
GetGraphicsMode
DeleteObject
RealizePalette
BitBlt
SaveDC
UpdateColors
GetTextFaceA
OffsetWindowOrgEx
Sections
.text Size: 335KB - Virtual size: 335KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ