d:\mtalss\iogh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b2cd128f641f78cd19250362d22b20af_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b2cd128f641f78cd19250362d22b20af_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2cd128f641f78cd19250362d22b20af_JaffaCakes118
-
Size
608KB
-
MD5
b2cd128f641f78cd19250362d22b20af
-
SHA1
d135e2f188475a35c6cdefef93b9b9f7156be97f
-
SHA256
4ea08e120f274de9515b28b8da6587bc525cf810c23e9acd79bb3ba7a926fc0b
-
SHA512
d7c667bf615a4595aa94b393de620592f09243eb6c1ed1f6a74c64d438d9087fb50889df68893634c00c5b804aba3761e67141d5b37bd90191bb93bd1b4ced6d
-
SSDEEP
6144:1xC2c3nzR+HTAoh3003D7Pu8uA0oWUZh+AjneAVX+iI9+6o3LEhVm/L8tTHI:Y3z8TtE8FL0RU7jnx69+6o3oh8/L8FI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2cd128f641f78cd19250362d22b20af_JaffaCakes118
Files
-
b2cd128f641f78cd19250362d22b20af_JaffaCakes118.exe windows:4 windows x86 arch:x86
b0f2d21df80357ecd09c0593b2d8bb71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Duplicate
ImageList_Create
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_LoadImageA
DrawStatusText
ImageList_Write
CreateUpDownControl
InitMUILanguage
ImageList_Merge
ImageList_Add
ImageList_SetFilter
ImageList_SetBkColor
ImageList_Remove
ImageList_DragLeave
advapi32
LookupPrivilegeDisplayNameA
RegFlushKey
CryptReleaseContext
LogonUserW
CryptGetDefaultProviderW
CryptGetDefaultProviderA
InitiateSystemShutdownW
CryptImportKey
RegOpenKeyExW
LookupPrivilegeDisplayNameW
RegQueryInfoKeyA
StartServiceW
CryptSetProviderA
RegQueryValueA
RegConnectRegistryW
RegEnumValueA
CryptEnumProviderTypesW
user32
GetWindowRgn
GetDlgItem
ChangeDisplaySettingsExW
DialogBoxParamW
DestroyWindow
DialogBoxIndirectParamA
GetThreadDesktop
SetWindowPos
EnumDesktopsA
SwitchDesktop
CallWindowProcA
DefWindowProcA
LookupIconIdFromDirectoryEx
GetDC
SendMessageA
CharLowerW
UnregisterClassW
ReleaseCapture
LookupIconIdFromDirectory
GetMenuStringW
ReplyMessage
TileChildWindows
ArrangeIconicWindows
GetScrollBarInfo
GetClipboardFormatNameW
DlgDirListA
GetUpdateRect
ShowCaret
GetDCEx
CharToOemW
ChangeDisplaySettingsA
WINNLSGetIMEHotkey
SetMenuItemBitmaps
SetWindowContextHelpId
DefDlgProcW
GetMenuStringA
GetWindowTextLengthA
GetCursorPos
GetWindowTextA
CharLowerBuffW
DragDetect
DrawTextA
ScrollWindow
DdePostAdvise
BroadcastSystemMessageW
CreateAcceleratorTableW
SetDebugErrorLevel
CreateDialogIndirectParamA
OpenWindowStationW
KillTimer
ShowWindow
PostMessageA
DlgDirListComboBoxW
CreateCaret
RegisterClassA
CharUpperBuffA
LoadIconA
SetWindowRgn
GetWindowPlacement
RemovePropA
MessageBoxA
ScrollWindowEx
DdeConnect
LoadMenuIndirectA
WINNLSGetEnableStatus
IsCharAlphaNumericW
SetMenu
EmptyClipboard
SetMenuItemInfoA
SetClassLongW
GetTopWindow
GetDlgCtrlID
GetMenuItemID
CreateMenu
CharNextW
RegisterClassExA
DdeCreateDataHandle
InvalidateRgn
CreateWindowExW
DrawTextExW
SetScrollRange
GetScrollInfo
DlgDirSelectExA
GetClassInfoA
DeleteMenu
SendDlgItemMessageA
IsMenu
OpenDesktopA
BroadcastSystemMessage
MessageBoxW
CopyImage
CloseWindow
EnumPropsW
EnableScrollBar
DdeSetQualityOfService
CreateIcon
OemKeyScan
GetMenuCheckMarkDimensions
MapWindowPoints
GetWindowRect
DlgDirListW
GetMenuContextHelpId
CallMsgFilterA
CascadeChildWindows
ChangeMenuA
gdi32
SetDeviceGammaRamp
ModifyWorldTransform
PatBlt
StretchBlt
SetBitmapDimensionEx
FixBrushOrgEx
SetAbortProc
PolyPolygon
GdiGetBatchLimit
GetCharWidth32W
ScaleViewportExtEx
GetTextCharsetInfo
GetMetaFileA
GetEnhMetaFileBits
UnrealizeObject
EnumObjects
SetICMProfileW
GetStretchBltMode
RestoreDC
GetCharABCWidthsFloatW
GetTextExtentPointW
GetGlyphOutlineW
Pie
kernel32
ExitProcess
HeapCreate
MultiByteToWideChar
CreateFileW
lstrcatW
WideCharToMultiByte
GetModuleHandleA
HeapDestroy
GetEnvironmentStrings
FindNextChangeNotification
LoadResource
FindResourceW
GlobalHandle
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeaps
InterlockedIncrement
GetStdHandle
GetCurrentThreadId
GetTimeFormatA
ReadConsoleInputW
GetLocalTime
GetProfileIntA
GetEnvironmentStringsW
LoadLibraryA
GlobalSize
VirtualProtectEx
FreeEnvironmentStringsA
LeaveCriticalSection
GetCurrentDirectoryW
ResumeThread
GetProcessHeap
GetCurrentProcessId
GetConsoleCP
Sleep
InterlockedDecrement
GlobalFindAtomW
SystemTimeToFileTime
SetVolumeLabelA
GetUserDefaultLCID
GetLocaleInfoA
GetTickCount
GetExitCodeProcess
CreateFileA
GetShortPathNameW
CloseHandle
WriteConsoleA
GetThreadTimes
GetTimeZoneInformation
SetFileAttributesA
GetConsoleOutputCP
GetCPInfo
ReadFile
SetSystemTime
GlobalUnfix
GetVersionExA
GetConsoleTitleA
VirtualProtect
GetFileType
FoldStringA
LCMapStringA
lstrcpynA
IsValidLocale
TransactNamedPipe
GetSystemTimeAsFileTime
VirtualQuery
SetLastError
VirtualAlloc
GetStringTypeW
GetMailslotInfo
GetCurrentProcess
HeapReAlloc
HeapFree
OpenFile
GetOEMCP
FindFirstFileExA
WriteFile
GetProcAddress
GetThreadContext
WaitNamedPipeW
GetACP
GetPrivateProfileSectionA
CompareStringW
WriteConsoleW
TerminateProcess
TlsFree
HeapSize
GetStringTypeA
SetConsoleTitleW
GetDiskFreeSpaceExA
QueryPerformanceCounter
FreeEnvironmentStringsW
OpenFileMappingW
GetConsoleCursorInfo
CreateWaitableTimerW
GetComputerNameA
GetDateFormatA
RtlUnwind
VirtualFree
IsDebuggerPresent
GetDriveTypeW
RaiseException
CreateMutexA
SetHandleCount
GetStartupInfoA
GetCommandLineA
ContinueDebugEvent
EnumSystemLocalesA
FlushFileBuffers
ReadConsoleA
GetConsoleMode
GetStartupInfoW
LCMapStringW
GetWindowsDirectoryA
CreateFileMappingW
GetPriorityClass
SetUnhandledExceptionFilter
GetLocaleInfoW
HeapAlloc
GetCurrentThread
InterlockedExchange
WriteConsoleInputW
MoveFileExW
TlsAlloc
TlsSetValue
SetConsoleCtrlHandler
CompareStringA
SetEnvironmentVariableA
UnhandledExceptionFilter
GetModuleFileNameA
GetLastError
SetStdHandle
GetModuleHandleW
TlsGetValue
SetFilePointer
OpenMutexA
LocalHandle
FreeLibrary
IsValidCodePage
DeleteCriticalSection
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ