H:\jcAhBvrvwt\TqfZobrhC\wfezSowizzv\ytliszsIpvOe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b1d6b39cbefe72a2802b8e20e698b9e2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1d6b39cbefe72a2802b8e20e698b9e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1d6b39cbefe72a2802b8e20e698b9e2_JaffaCakes118
-
Size
405KB
-
MD5
b1d6b39cbefe72a2802b8e20e698b9e2
-
SHA1
03f8402d1535d006a39f2605599d85285bd0b507
-
SHA256
fff26bdcd83f6b3d2da413e7a96aab678ac738c63d27f60b2df9051587031b8b
-
SHA512
151f31bfbaaa10fbb712e73a976a7eb4bb4421653fe7f8ef7062e8a4c06604c6d3e77de53cc99d0cd178e517aed48baabcef8e18276379b80382edb95c1680cb
-
SSDEEP
12288:R58evU+8NJtYVUXOeO1DIauDouXiL7ROU2HJrMb:kjEVpzs5DouXSROUsMb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1d6b39cbefe72a2802b8e20e698b9e2_JaffaCakes118
Files
-
b1d6b39cbefe72a2802b8e20e698b9e2_JaffaCakes118.exe windows:5 windows x86 arch:x86
1ca3a91bbed527c80ba118e9fe86616d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntdll
memset
user32
LoadStringW
DrawTextW
CharPrevA
ChildWindowFromPoint
LockWindowUpdate
DrawFrameControl
CopyImage
InsertMenuA
SetWindowTextA
DestroyMenu
GetDlgItem
DrawIcon
ShowScrollBar
CharLowerA
CheckDlgButton
ShowCaret
ShowWindow
LookupIconIdFromDirectory
GetDlgItemTextW
GetAsyncKeyState
RemoveMenu
LoadCursorA
MapVirtualKeyA
LoadImageA
CopyRect
wvsprintfW
InternalGetWindowText
CreateDialogParamW
shlwapi
PathRelativePathToA
UrlGetPartA
gdi32
GetTextMetricsW
SetBrushOrgEx
MoveToEx
SetStretchBltMode
SetRectRgn
SetBkMode
ExcludeClipRect
CreatePolygonRgn
SetPaletteEntries
GetBitmapBits
GetMapMode
GetCurrentObject
RestoreDC
kernel32
CompareStringA
TerminateThread
GetModuleFileNameA
GetSystemDefaultLangID
EnumSystemLocalesA
MoveFileExW
lstrlenA
AddAtomW
EscapeCommFunction
GlobalAddAtomA
HeapCreate
lstrcatW
VirtualAlloc
GetModuleHandleA
lstrcmpA
FindFirstFileW
SetErrorMode
msvcrt
exit
comdlg32
GetSaveFileNameA
ChooseColorW
Exports
Exports
?TMSUevsekotu_iVRM_C@@YGGG@Z
Sections
.text Size: 395KB - Virtual size: 394KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 258B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 105B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data1 Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 512B - Virtual size: 479B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 512B - Virtual size: 421B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 500KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ