L:\OiRqXtfOhbndg\SzxWeRhf\wqzfCjvbH\iJepRDyEiB\SmjJaIpkDpmWdg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aefda3b502a71249fe254feba2c5eee5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aefda3b502a71249fe254feba2c5eee5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aefda3b502a71249fe254feba2c5eee5_JaffaCakes118
-
Size
220KB
-
MD5
aefda3b502a71249fe254feba2c5eee5
-
SHA1
4d24523662022c3ca6dc80f04e8a8e997201642f
-
SHA256
b2d8e6f533250bebc902bb4035e0b6e09dbb5c1e8fc985cf9578ed4586d8afc4
-
SHA512
08e4f1ed8db9d223ba6a6d5e869aa8943775af49cb334bcefb110303b0afb40ce93d3e35f26407a8d3ccde178e5f56e99edcb89d51887c8d26da588fdaec25fe
-
SSDEEP
3072:CXG6SvGINjsWZYgDgK2RbnHqOfIoV+nfELc8jb+EnJZBsTdiM6cA80V9G:4TIds9jrHqOfa0n/dnJSkMu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aefda3b502a71249fe254feba2c5eee5_JaffaCakes118
Files
-
aefda3b502a71249fe254feba2c5eee5_JaffaCakes118.exe windows:5 windows x86 arch:x86
7e641a5a1b97f92a13e9021986d218ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
KillTimer
GetDlgItemTextW
DestroyIcon
CreateDialogParamA
GetDlgItemInt
GetWindowTextA
OffsetRect
SetMenuDefaultItem
SendDlgItemMessageW
SetActiveWindow
DrawFrameControl
GetMenuCheckMarkDimensions
WaitMessage
GetAsyncKeyState
MapVirtualKeyExW
ChildWindowFromPoint
FrameRect
IsWindowVisible
RegisterWindowMessageW
DrawStateA
HideCaret
BeginDeferWindowPos
ReleaseDC
GetScrollPos
MapVirtualKeyA
TranslateAcceleratorW
IsRectEmpty
ShowCursor
GetMenu
SetPropW
BeginPaint
RegisterClassExA
SetWindowLongW
GetUserObjectInformationW
SetWindowPos
DeferWindowPos
ShowOwnedPopups
GetMenuItemInfoW
keybd_event
MapWindowPoints
GetDlgItemTextA
InSendMessageEx
DestroyAcceleratorTable
DefFrameProcW
InvalidateRgn
OpenInputDesktop
EnableWindow
TranslateMessage
ShowCaret
RegisterHotKey
CreateDialogParamW
SetDlgItemTextA
CharUpperBuffA
SetWindowTextA
ToUnicodeEx
LoadAcceleratorsA
wvsprintfA
GetWindowDC
EnableMenuItem
BringWindowToTop
GetMessageTime
DestroyMenu
CharNextExA
DialogBoxParamW
LoadStringA
DrawTextW
IsCharLowerA
RemovePropW
GetActiveWindow
SendMessageA
PostQuitMessage
GetKeyState
RegisterClassW
ExitWindowsEx
CreateWindowExA
CreateCaret
PostMessageW
EnumChildWindows
MonitorFromRect
LoadBitmapA
RemoveMenu
CheckDlgButton
SetForegroundWindow
EndPaint
LoadBitmapW
InvertRect
GetNextDlgGroupItem
DrawAnimatedRects
LoadMenuA
wvsprintfW
GetWindowLongW
GetSysColor
FindWindowW
AttachThreadInput
GetMessageA
InsertMenuW
IsDialogMessageA
EqualRect
UnionRect
GetMenuItemCount
EnumWindows
CharLowerW
MessageBoxExW
EndTask
SetMenuItemBitmaps
CharLowerBuffW
SetDlgItemTextW
GetMenuStringW
ValidateRect
ClipCursor
SendMessageTimeoutA
GetMenuItemRect
psapi
GetProcessImageFileNameW
gdi32
CreatePenIndirect
OffsetRgn
CreatePen
SetDIBits
SetDIBColorTable
DPtoLP
SetViewportExtEx
GetNearestPaletteIndex
GetWindowOrgEx
RoundRect
GetRgnBox
SetWindowOrgEx
SetViewportOrgEx
EnumFontFamiliesW
StretchBlt
CreatePatternBrush
GetTextExtentPoint32A
CreateDIBSection
EndPage
CreateDCW
ResizePalette
TextOutW
CreateDIBitmap
RealizePalette
CreatePalette
SetLayout
CreateFontIndirectW
GetDIBColorTable
Polygon
GetTextColor
GetCharWidth32W
Polyline
GetTextMetricsA
GetTextExtentExPointW
ExtFloodFill
GetFontData
ScaleViewportExtEx
GetTextExtentPoint32W
GetTextAlign
SaveDC
CreateRoundRectRgn
EndDoc
RectInRegion
StartDocW
RemoveFontResourceW
DeleteObject
LPtoDP
msvcrt
strcpy
toupper
swscanf
_controlfp
__set_app_type
system
__p__fmode
__p__commode
fwrite
_amsg_exit
wcsncmp
isalnum
strspn
_initterm
strchr
fgets
free
strcspn
wcscpy
isalpha
wcslen
strtoul
iswxdigit
isprint
printf
strstr
putchar
towlower
iswdigit
strrchr
isdigit
_ismbblead
_XcptFilter
fputs
wcscat
_exit
_cexit
wcscoll
__setusermatherr
__getmainargs
realloc
strpbrk
sscanf
wcsstr
kernel32
GetNumberFormatW
DeleteCriticalSection
IsBadReadPtr
GetCommTimeouts
FindNextFileW
ResetEvent
GlobalFindAtomW
FreeResource
SetCommMask
EnumResourceLanguagesA
GetWindowsDirectoryW
DisconnectNamedPipe
LeaveCriticalSection
FindResourceW
GetLongPathNameW
WaitForSingleObjectEx
ClearCommBreak
GetProcessHeap
SetUnhandledExceptionFilter
GetBinaryTypeW
CancelWaitableTimer
GetWindowsDirectoryA
GetThreadPriority
CreatePipe
UnhandledExceptionFilter
IsBadCodePtr
GetSystemTime
GetExitCodeThread
VirtualFree
SetCurrentDirectoryA
GetLocaleInfoW
GetFileTime
GetAtomNameA
FindFirstFileA
SetThreadLocale
GetTickCount
SetupComm
GetVersionExW
GetSystemDirectoryA
VerSetConditionMask
GetUserDefaultLCID
GetOverlappedResult
QueryDosDeviceW
GlobalMemoryStatusEx
GetComputerNameA
SetSystemTimeAdjustment
LoadResource
GetFullPathNameW
GetSystemWindowsDirectoryW
UnlockFile
HeapFree
HeapAlloc
SetSystemTime
SetThreadAffinityMask
lstrcatA
UnmapViewOfFile
Exports
Exports
?ModifyScreenExW@@YGDMIHPAF]A
?IsNotTimerExA@@YGPAEPAIPAE]A
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.packed Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ