f:\ccptoee\iareacxc\panuvt\xevk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae19e695651f4fbea09127263639309a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae19e695651f4fbea09127263639309a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae19e695651f4fbea09127263639309a_JaffaCakes118
-
Size
700KB
-
MD5
ae19e695651f4fbea09127263639309a
-
SHA1
e2d2024f5d2bfebc8d20e21d97feaa21d8ef5122
-
SHA256
1741e570711b9ce8c533442f8cde8e5908f203710819f4bc457efec765b3e7e9
-
SHA512
ae6aa3d6daeef60aeaa7aafcfba07696c1fadc12b34cb3427c681344755cc365b7457af857684909205e8c88852c0462060d4e4a5680d9ed8e6bbae042c9240f
-
SSDEEP
12288:bo7qW/TaJxmjFj+7Xg0YSKhuh1LCReHvt4D9vJ/MEXz4Po3L:E+m0mjFC7Xg0LCIv8J/vzIW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae19e695651f4fbea09127263639309a_JaffaCakes118
Files
-
ae19e695651f4fbea09127263639309a_JaffaCakes118.exe windows:4 windows x86 arch:x86
af8a2114e811e38d5bcbec29e41fc7f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
DestroyPropertySheetPage
InitCommonControlsEx
ImageList_GetImageCount
CreatePropertySheetPageA
ImageList_Replace
ImageList_Add
ImageList_Destroy
ImageList_GetIconSize
ord17
ImageList_ReplaceIcon
ImageList_Remove
user32
WindowFromPoint
CheckDlgButton
EnableWindow
SetMenuItemInfoW
OffsetRect
DestroyIcon
CheckMenuItem
ScrollWindow
GetDlgItemInt
EmptyClipboard
SetWindowTextW
GetWindowPlacement
DrawFrameControl
MoveWindow
ShowWindow
DeferWindowPos
LoadIconW
GetSubMenu
GetMenuItemInfoW
ModifyMenuW
IsIconic
DrawEdge
DestroyMenu
SetDlgItemInt
SendMessageW
UnhookWindowsHookEx
InsertMenuW
OpenClipboard
GetMenuItemID
SetParent
LoadBitmapW
GetForegroundWindow
SystemParametersInfoW
GetWindowRect
DefMDIChildProcW
GetDlgItem
SetWindowLongW
SystemParametersInfoA
IsWindowEnabled
MessageBoxW
CallNextHookEx
DefFrameProcW
LoadAcceleratorsW
GetActiveWindow
SetTimer
EnableMenuItem
GetMenuItemCount
CreateWindowExW
GetKeyState
IsChild
RegisterClassExW
SetCursor
SetWindowRgn
GetMenuStringW
IntersectRect
GetWindowLongW
BeginPaint
SetMenu
RegisterClipboardFormatW
DrawMenuBar
DeleteMenu
DestroyWindow
SetForegroundWindow
AppendMenuW
GetWindowTextLengthW
SetMenuDefaultItem
DestroyCursor
EndDialog
GetCursorPos
SetRect
GetKeyNameTextW
GetWindowDC
GetClipboardData
KillTimer
InflateRect
PostQuitMessage
GetDoubleClickTime
GetMenu
IsWindow
IsDlgButtonChecked
GetClassLongW
SetCapture
RegisterClassW
ReleaseDC
GetSystemMetrics
LoadCursorW
EndPaint
GetParent
PostMessageW
InvalidateRect
TrackPopupMenu
GetNextDlgTabItem
GetAsyncKeyState
RegisterWindowMessageW
DefWindowProcW
UpdateWindow
GetSystemMenu
SetActiveWindow
CallWindowProcW
CopyRect
CreatePopupMenu
ScreenToClient
GetSysColor
ReleaseCapture
LoadImageW
GetMessageW
CopyAcceleratorTableW
SetWindowPlacement
GetFocus
MapWindowPoints
GetCapture
CreateDialogIndirectParamW
ole32
CreateBindCtx
CoInitialize
OleUninitialize
CoLockObjectExternal
OleInitialize
StringFromGUID2
kernel32
GetTimeZoneInformation
VirtualQuery
VirtualAlloc
GetModuleFileNameA
CreateMutexW
GetVersion
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetStringTypeW
GetStartupInfoW
TlsSetValue
RaiseException
InitializeCriticalSection
FlushFileBuffers
HeapReAlloc
GetStringTypeA
HeapAlloc
HeapDestroy
GetCurrentProcessId
GetStartupInfoA
GetEnvironmentStrings
MultiByteToWideChar
HeapCreate
LoadLibraryA
RtlUnwind
TlsAlloc
GetLocalTime
GetSystemTimeAsFileTime
SetFilePointer
TlsGetValue
QueryPerformanceCounter
InterlockedIncrement
SetStdHandle
CloseHandle
CompareStringA
GetFileType
HeapFree
CompareStringW
GetCurrentProcess
SetHandleCount
GetModuleHandleA
IsBadCodePtr
WideCharToMultiByte
SetLastError
GetCPInfo
LeaveCriticalSection
VirtualFree
WriteFile
LoadLibraryW
ExitProcess
InterlockedExchange
GetEnvironmentStringsW
TerminateProcess
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCommandLineW
SetUnhandledExceptionFilter
EnterCriticalSection
GetTickCount
ReadFile
SetEnvironmentVariableA
FreeEnvironmentStringsW
LCMapStringA
GetCommandLineA
InterlockedDecrement
LCMapStringW
GetLastError
GetStdHandle
DeleteCriticalSection
GetCurrentThreadId
GetSystemTime
oleaut32
LoadTypeLi
advapi32
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RegEnumKeyA
GetFileSecurityA
RegSetValueExA
winspool.drv
ord204
ClosePrinter
DocumentPropertiesA
shell32
DragFinish
ShellExecuteA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 469KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ