U:\cgdbQJFfzXiuP\nBsRixeEpll\clegznkqGbW.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b0e8bb0b2ab38cd7b1f24d61c1b282c4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b0e8bb0b2ab38cd7b1f24d61c1b282c4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0e8bb0b2ab38cd7b1f24d61c1b282c4_JaffaCakes118
-
Size
214KB
-
MD5
b0e8bb0b2ab38cd7b1f24d61c1b282c4
-
SHA1
f0779adec5c3acfd7ea7a4387791c0a22eb64f60
-
SHA256
593c4477076b9f4fcd69c0c44f35fc5f265ce579e3a272e48cd9169c092a714f
-
SHA512
b1074f5e3a13da65e6f22728df932e135d89867bb31fba4f870194836c6e8fada4101ec8bf766278d63c1b33c743ad6f2331d9baf9084bf5c79a3271a6420b57
-
SSDEEP
3072:Q5nyNr1VH62WdVsDyWDNm0au7+zmUio4Smpf0rpCzec++XXsDjZJRsVjbh:Q9ybV68NauOmBSmJ0e/mJRsr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0e8bb0b2ab38cd7b1f24d61c1b282c4_JaffaCakes118
Files
-
b0e8bb0b2ab38cd7b1f24d61c1b282c4_JaffaCakes118.exe windows:5 windows x86 arch:x86
59b321b85d05f4e8973f1dd41e53dcb0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathStripPathW
kernel32
HeapWalk
GetWindowsDirectoryW
CompareFileTime
SetThreadAffinityMask
IsBadReadPtr
SetCommMask
CopyFileW
lstrcpyW
CreateMailslotW
GetLastError
GetSystemDefaultLangID
GlobalAddAtomW
HeapLock
SetLastError
GetCurrentThreadId
GetFileAttributesExW
CreateFileMappingW
CreateWaitableTimerA
IsDBCSLeadByteEx
GetTempPathA
lstrcmpiW
LocalAlloc
CancelIo
SetCurrentDirectoryA
FileTimeToDosDateTime
BuildCommDCBAndTimeoutsW
GetTickCount
HeapAlloc
LocalUnlock
IsBadStringPtrW
lstrcatW
EnumResourceTypesA
GetCommandLineA
GetComputerNameExW
SetNamedPipeHandleState
GetThreadContext
GetStartupInfoA
SetTimerQueueTimer
CreateMutexW
ReadFile
RegisterWaitForSingleObject
WinExec
gdi32
ResizePalette
GetDIBColorTable
SetWindowExtEx
DPtoLP
UnrealizeObject
GetBitmapBits
SetPixel
WidenPath
GetTextExtentPoint32W
BeginPath
StartDocW
CreateCompatibleBitmap
CreatePolygonRgn
SetStretchBltMode
CreateFontW
CreateBrushIndirect
GetViewportOrgEx
SelectObject
GetDeviceCaps
RestoreDC
CreateEllipticRgnIndirect
StretchBlt
SetMapMode
LineTo
GetTextAlign
GetCurrentObject
GetLayout
CreatePalette
PatBlt
GetObjectW
CreateDIBSection
SetTextAlign
CreateDIBitmap
SetROP2
GetROP2
CreateRoundRectRgn
GetNearestColor
user32
ShowWindowAsync
wvsprintfA
SendMessageTimeoutW
EnableMenuItem
CharUpperBuffA
GetMenuItemInfoW
DrawIconEx
GetKeyboardLayoutList
EqualRect
RemovePropW
RegisterClassW
GetMessageW
GetLastActivePopup
LoadMenuW
LoadStringW
PostThreadMessageA
SetScrollPos
PostThreadMessageW
CreateAcceleratorTableW
DrawStateW
MonitorFromRect
GetDlgItemTextW
ChildWindowFromPointEx
SetSysColors
GetUpdateRect
RegisterHotKey
EnumThreadWindows
RegisterWindowMessageA
AdjustWindowRectEx
DrawTextA
GetWindowTextLengthW
SetWindowTextA
GetFocus
SwitchToThisWindow
MapWindowPoints
DrawMenuBar
InvalidateRect
GetMenu
CopyAcceleratorTableW
DestroyCursor
OpenDesktopW
DrawIcon
SetActiveWindow
CharToOemBuffA
GetDlgItemInt
CheckDlgButton
GetClassLongA
SetDlgItemTextA
CreateDialogIndirectParamW
UnionRect
GetDesktopWindow
SendDlgItemMessageA
IsCharAlphaNumericW
CharLowerBuffW
TileWindows
GetClassInfoExW
SetMenu
GetDCEx
MoveWindow
RegisterClassExA
DefWindowProcW
SetFocus
SetRectEmpty
CreatePopupMenu
OemToCharBuffA
SetCaretPos
ClipCursor
IsWindowVisible
LoadAcceleratorsW
BeginDeferWindowPos
GetUserObjectInformationW
KillTimer
GetCursorPos
GetWindowTextA
CreateWindowExA
ValidateRect
FrameRect
PostQuitMessage
CallWindowProcA
mouse_event
AllowSetForegroundWindow
CharUpperW
LoadMenuA
ExitWindowsEx
RedrawWindow
ModifyMenuW
GetScrollRange
InvalidateRgn
GetSysColorBrush
IsWindow
MessageBoxExA
msvcrt
_controlfp
wcscmp
wcscpy
iswalpha
strtol
isspace
wcstoul
__set_app_type
strspn
vswprintf
__p__fmode
wcstombs
putchar
__p__commode
remove
_amsg_exit
fflush
isprint
iswxdigit
fclose
strcpy
_initterm
wcstol
_acmdln
fputc
calloc
exit
_ismbblead
_XcptFilter
_exit
perror
bsearch
strrchr
_cexit
__setusermatherr
__getmainargs
puts
strcoll
fputs
wcstok
Exports
Exports
?SleepAhHJDud@@YGKEPA_WG@Z
?SleepUDSUDlkdlsds@@YGKEPA_WG@Z
?SleepUDudjkUD@@YGKEPA_WG@Z
?SleepYDyjDuUI@@YGKEPA_WG@Z
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 339B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ