c:\kmaryxtotb\exbn\opaaoebq\rzavoc\dfro\kotltxz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae61a3833deabd776da1286acbe0a028_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae61a3833deabd776da1286acbe0a028_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae61a3833deabd776da1286acbe0a028_JaffaCakes118
-
Size
724KB
-
MD5
ae61a3833deabd776da1286acbe0a028
-
SHA1
933db0acefb93b133b075de926beb26979663bf9
-
SHA256
41e2a90c65e598a5bf5b75c2fe434c04c9829d42ab353e1a2f2900ca0f7b53b3
-
SHA512
c9975d6646624d93e9f1a271ae6a05a29ac6c65c15df37b211fcf3d74523a39eb489466635b3e9bfb6b48d0f73b0c66e508e6e85164947c97fba7e96f8aae8ce
-
SSDEEP
12288:CIIThGsOcyQ3s6KO/XfFN8aA4O87AV8APLuSE17wf7nRSTDAGW:CtThfOY3sq333j/APAqfzRoxW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae61a3833deabd776da1286acbe0a028_JaffaCakes118
Files
-
ae61a3833deabd776da1286acbe0a028_JaffaCakes118.exe windows:4 windows x86 arch:x86
6cf8a326e21c21cac2d75a159dab12c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Add
ImageList_Destroy
ImageList_SetBkColor
ImageList_DragMove
ImageList_EndDrag
comdlg32
GetFileTitleA
GetOpenFileNameA
user32
DefWindowProcA
WindowFromPoint
TranslateMessage
SendDlgItemMessageA
FindWindowA
SetPropA
GetWindowTextLengthA
GetMessagePos
GetClassInfoA
GetMenuItemInfoA
LoadStringA
GetMessageA
CheckRadioButton
LoadIconA
ModifyMenuA
CharUpperA
TrackPopupMenuEx
ReleaseDC
GetActiveWindow
GetDesktopWindow
RegisterClassExA
IsChild
SetMenuItemInfoA
DestroyMenu
LoadCursorA
GetPropA
GetSystemMetrics
GetWindow
LoadAcceleratorsA
FillRect
SetRectEmpty
RegisterClassA
EmptyClipboard
InflateRect
CallNextHookEx
LoadBitmapA
GetWindowTextA
RedrawWindow
ClientToScreen
kernel32
SetHandleCount
CloseHandle
TlsGetValue
GetEnvironmentStringsW
FreeEnvironmentStringsA
LoadLibraryA
WriteFile
GetVersion
FlushFileBuffers
GetStringTypeW
GetSystemTimeAsFileTime
CompareStringA
HeapDestroy
IsBadCodePtr
UnhandledExceptionFilter
GetCommandLineA
LCMapStringA
HeapReAlloc
InterlockedDecrement
VirtualAlloc
CreateMutexA
TlsSetValue
ExitProcess
HeapFree
GetLocalTime
EnterCriticalSection
LCMapStringW
SetUnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
TlsAlloc
GetFileType
LeaveCriticalSection
QueryPerformanceCounter
SetLastError
GetOEMCP
WideCharToMultiByte
GetStringTypeA
SetStdHandle
SetEnvironmentVariableA
GetCPInfo
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
RaiseException
GetStdHandle
HeapAlloc
GetEnvironmentStrings
HeapCreate
InterlockedExchange
GetProcAddress
GetStartupInfoA
RtlUnwind
ReadFile
GetLastError
GetTimeZoneInformation
InterlockedIncrement
VirtualFree
VirtualQuery
CompareStringW
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
SetFilePointer
GetTickCount
GetCurrentThreadId
GetSystemTime
FreeEnvironmentStringsW
GetACP
wininet
InternetGetLastResponseInfoA
InternetQueryDataAvailable
HttpAddRequestHeadersA
InternetSetFilePointer
HttpQueryInfoA
InternetSetStatusCallback
InternetCrackUrlA
InternetCloseHandle
InternetCanonicalizeUrlA
InternetOpenA
InternetWriteFile
oleaut32
LoadTypeLi
shell32
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
ord155
ole32
CoRevokeClassObject
OleIsCurrentClipboard
CoRegisterMessageFilter
gdi32
FillPath
SetPolyFillMode
UnrealizeObject
EnumFontFamiliesExA
CreateDIBitmap
SetPixel
GetBkColor
StretchDIBits
DeleteDC
LPtoDP
SetViewportOrgEx
GetTextColor
GdiFlush
GetBkMode
CreateRectRgn
FrameRgn
CreatePen
CreateFontIndirectA
LineTo
SetMapMode
GetFontData
SetTextAlign
SetDIBitsToDevice
GetDIBits
GetObjectA
DeleteObject
SelectPalette
Polyline
advapi32
RegCloseKey
RegDeleteValueA
RegSetValueExA
GetUserNameA
CloseServiceHandle
RegEnumKeyExA
RegOpenKeyA
FreeSid
RegOpenKeyExW
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExW
GetTokenInformation
ControlService
SetServiceStatus
RegSetValueExW
OpenProcessToken
SetSecurityDescriptorDacl
RegQueryValueExA
RegCreateKeyExA
RegCreateKeyA
AllocateAndInitializeSid
DeleteService
InitializeSecurityDescriptor
DeregisterEventSource
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 468KB - Virtual size: 467KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ