d:\Projects\WinRAR\SFX\build\sfxzip32\Release\sfxzip.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b3a30953b08948b052a9271da6b72586_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b3a30953b08948b052a9271da6b72586_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b3a30953b08948b052a9271da6b72586_JaffaCakes118
-
Size
1.3MB
-
MD5
b3a30953b08948b052a9271da6b72586
-
SHA1
b375cec662f5b65a692306cf53881c706aae1a10
-
SHA256
01c3eabbba3b2a01b8eb01a40cd704888c0d6a422a37e9755be7dc88587803ea
-
SHA512
9bd73291799a0fa6d5ccc4de0c227b90bae0ec5351bdba5cef98eb53d0b6ff8e258e4dd5a6dcbb53653a40839b2d017a6b8b483d809afe0acb6993f596960ce6
-
SSDEEP
24576:kekco1LsqX3deSUzyqnDu5V21cnDi4fVbqEs0YjjfjcWUtvoEy:zZq9OXnDu+wDi4fVBiPcxTy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3a30953b08948b052a9271da6b72586_JaffaCakes118
Files
-
b3a30953b08948b052a9271da6b72586_JaffaCakes118.exe windows:5 windows x86 arch:x86
4e4a6567cbea35142a862e0fc30c302e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
shlwapi
SHAutoComplete
kernel32
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
MoveFileW
DeleteFileW
DeleteFileA
CreateDirectoryA
CreateDirectoryW
FindClose
FindNextFileA
FindFirstFileA
FindNextFileW
FindFirstFileW
GetTickCount
WideCharToMultiByte
GlobalAlloc
GetVersionExW
GetFullPathNameA
GetFullPathNameW
MultiByteToWideChar
GetModuleFileNameW
FindResourceW
GetModuleHandleW
HeapAlloc
GetProcessHeap
HeapFree
WriteFile
CompareStringA
ExitProcess
GetLocaleInfoW
GetNumberFormatW
GetDateFormatW
GetTimeFormatW
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsW
WaitForSingleObject
Sleep
GetExitCodeProcess
GetTempPathW
MoveFileExW
UnmapViewOfFile
MapViewOfFile
GetCommandLineW
CreateFileMappingW
SetEnvironmentVariableW
OpenFileMappingW
GetProcAddress
SystemTimeToFileTime
CompareStringW
IsDBCSLeadByte
GetCPInfo
SetCurrentDirectoryW
LoadLibraryW
FreeLibrary
SetFileTime
GetStdHandle
ReadFile
CreateFileW
CreateFileA
GetCurrentDirectoryW
GetFileType
SetFilePointer
CloseHandle
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetEndOfFile
SetLastError
GetLastError
HeapReAlloc
user32
CharToOemBuffA
CharUpperA
OemToCharBuffA
wvsprintfA
wvsprintfW
ReleaseDC
GetDC
SendMessageW
SetDlgItemTextW
SetFocus
EndDialog
DestroyIcon
SendDlgItemMessageW
GetDlgItemTextW
GetClassNameW
DialogBoxParamW
IsWindowVisible
WaitForInputIdle
SetForegroundWindow
GetSysColor
PostMessageW
LoadBitmapW
LoadStringW
CharToOemA
OemToCharA
FindWindowExW
UpdateWindow
LoadCursorW
RegisterClassExW
SetWindowLongW
GetWindowLongW
DefWindowProcW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
DestroyWindow
GetClientRect
IsWindow
MessageBoxW
ShowWindow
GetDlgItem
EnableWindow
SetWindowPos
GetWindowTextW
SetWindowTextW
GetSystemMetrics
GetWindow
CharUpperW
GetWindowRect
GetParent
MapWindowPoints
LoadIconW
CreateWindowExW
CopyRect
gdi32
CreateCompatibleDC
DeleteObject
GetDeviceCaps
GetObjectW
CreateCompatibleBitmap
SelectObject
StretchBlt
DeleteDC
advapi32
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
shell32
SHChangeNotify
ShellExecuteExW
SHFileOperationW
SHGetFileInfoW
SHGetSpecialFolderLocation
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
OleUninitialize
OleInitialize
CoCreateInstance
CreateStreamOnHGlobal
CLSIDFromString
oleaut32
VariantInit
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ