E:\ddczebz\rmheukyehsxC\guTstbmspH\zoFZrOeyZhfMlv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b0a5ba1e1744131e4ecf26916b8d6d25_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b0a5ba1e1744131e4ecf26916b8d6d25_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0a5ba1e1744131e4ecf26916b8d6d25_JaffaCakes118
-
Size
218KB
-
MD5
b0a5ba1e1744131e4ecf26916b8d6d25
-
SHA1
33a00f35da55af745723a671a93bf29c533ad4ea
-
SHA256
f966d8ad9ac0370157f1ca9cc51c9a1c8928164612defc3934a79d1fca3ac2ad
-
SHA512
bed7b1fc48daf2c9cf68d01ac01c880d454f623103384fccba43683fff1cfe368a4740132c7d0333e0be7af33ac5c40e6f3403afb5f24aab3597e92365ef259f
-
SSDEEP
3072:Ri1rJYLxMC4FqZpf6+G6haR8eA29GvCJBN/ehnwOlXIrJS3Tutt0dyc+k7C3FA8W:M1A4MZpfdq3JL/c3MS3Tot5SG3uCe9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0a5ba1e1744131e4ecf26916b8d6d25_JaffaCakes118
Files
-
b0a5ba1e1744131e4ecf26916b8d6d25_JaffaCakes118.exe windows:5 windows x86 arch:x86
f69b788f48cd7450ee5944207e4b62bd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
GetProcessImageFileNameW
user32
AppendMenuW
GetActiveWindow
SetScrollRange
CopyRect
GetDC
GetLastActivePopup
SetParent
RegisterClassExA
SetForegroundWindow
IsChild
DestroyCursor
GetKeyNameTextW
SetMenuDefaultItem
KillTimer
MapVirtualKeyA
InsertMenuA
GetNextDlgTabItem
DeleteMenu
CallWindowProcW
GetKeyState
DrawAnimatedRects
CloseDesktop
CreateIconIndirect
GetDlgItem
SetClassLongW
DrawStateW
GetAsyncKeyState
ScrollWindow
CharUpperBuffW
MapDialogRect
IsCharLowerA
DefFrameProcW
SetUserObjectInformationW
EnumThreadWindows
TabbedTextOutW
DestroyIcon
GetMenuItemCount
GetClipCursor
TrackPopupMenu
ToUnicodeEx
GetTopWindow
IsWindowVisible
CharUpperW
ScreenToClient
CharToOemA
CharUpperA
WaitForInputIdle
DialogBoxParamA
OpenDesktopW
EnableScrollBar
UpdateWindow
GetClassInfoA
SendMessageA
MessageBoxW
DeferWindowPos
ShowScrollBar
MapVirtualKeyW
IsWindowEnabled
GetDlgItemTextA
RegisterHotKey
LoadStringA
GetShellWindow
OemToCharBuffA
GetMenuState
wsprintfW
GetMessageA
DispatchMessageW
GetMenuItemInfoW
SendInput
CheckDlgButton
RemovePropW
EndPaint
CharToOemW
DestroyWindow
GetScrollInfo
SetWindowPlacement
wvsprintfW
InSendMessageEx
ValidateRect
GetKeyboardLayoutNameW
OpenInputDesktop
SetDlgItemTextA
DestroyMenu
LoadIconA
UnloadKeyboardLayout
LoadMenuW
SetWindowRgn
LoadMenuA
DrawFocusRect
PtInRect
IsDialogMessageA
mouse_event
GetNextDlgGroupItem
SetDlgItemInt
TranslateMessage
EndDialog
GetUpdateRgn
IsRectEmpty
GetWindowLongA
GetMonitorInfoW
SetLastErrorEx
CreateDialogIndirectParamW
SendNotifyMessageW
GetSysColor
CreateMenu
SetDlgItemTextW
SendMessageTimeoutW
SwapMouseButton
GetMenuItemRect
CreateCursor
GetForegroundWindow
gdi32
GetObjectW
LineTo
GetTextExtentExPointW
SaveDC
CreateRoundRectRgn
CreateBrushIndirect
SetWindowExtEx
Escape
GetDIBits
EnumFontsW
CreateBitmap
SetAbortProc
GetBitmapBits
CreateCompatibleDC
LineDDA
ExcludeClipRect
EndPath
CreateICW
GetNearestPaletteIndex
GetTextMetricsW
SetPixel
SelectPalette
CombineRgn
GetPixel
CreateHalftonePalette
GetViewportOrgEx
CreatePen
EnumFontFamiliesW
SetMapMode
EndPage
MoveToEx
Polyline
CreateEllipticRgnIndirect
SetBitmapBits
WidenPath
SetDIBitsToDevice
SetViewportOrgEx
GetTextCharsetInfo
GetObjectA
SetBrushOrgEx
Polygon
SetBkColor
SetTextColor
SetDIBColorTable
CreateFontW
StretchBlt
OffsetRgn
kernel32
GetProcessHeap
lstrlenA
LoadResource
CreateEventW
GetShortPathNameA
GetACP
CreateEventA
HeapAlloc
RemoveDirectoryW
HeapFree
GetThreadPriority
VerifyVersionInfoW
GetStringTypeExW
VirtualFree
SetTimerQueueTimer
GlobalFlags
SetThreadAffinityMask
FindResourceW
SetFileAttributesW
LoadLibraryExW
GlobalGetAtomNameA
FindFirstChangeNotificationW
EnumResourceLanguagesA
GetCommConfig
CreatePipe
GetBinaryTypeA
GetSystemTimeAdjustment
FreeResource
GlobalAddAtomA
lstrcmpiW
CreateSemaphoreA
GlobalSize
HeapValidate
lstrlenW
GetFileType
SetPriorityClass
GetCommProperties
LoadLibraryW
SetThreadContext
GlobalCompact
QueryDosDeviceW
ClearCommBreak
ResumeThread
SetThreadExecutionState
CreateSemaphoreW
UnlockFile
EscapeCommFunction
TerminateThread
GetLocaleInfoA
GetBinaryTypeW
CancelIo
EnumSystemLocalesA
FlushFileBuffers
OpenSemaphoreW
OpenEventW
msvcrt
isxdigit
_controlfp
gets
free
perror
localtime
__set_app_type
printf
iswprint
putchar
wcscspn
calloc
__p__fmode
fputs
__p__commode
strstr
system
strpbrk
_amsg_exit
wcstol
_initterm
_ismbblead
rand
islower
setlocale
setvbuf
_XcptFilter
gmtime
time
_exit
toupper
_cexit
wcstod
strerror
__setusermatherr
__getmainargs
getenv
wcsstr
bsearch
strrchr
realloc
strcoll
strcpy
fprintf
Exports
Exports
?IsNotTimerExA@@YGPAHPAM]A
?ModifyFunctionOriginal@@YGPADIK]A
Sections
.text Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.packed Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ