iedw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b5aa9d062c474e44580616603b14f07a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b5aa9d062c474e44580616603b14f07a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b5aa9d062c474e44580616603b14f07a_JaffaCakes118
-
Size
117KB
-
MD5
b5aa9d062c474e44580616603b14f07a
-
SHA1
ac714de654e181dfc6c6c95bac5d444a718dcb24
-
SHA256
86eecbf08b09835c83b14c0edf23eeb8ac28023b56c1ac993aafc0f3da84cc96
-
SHA512
92c7cb6b2988fa097d55aca0092193de7d84736b0bab3e3dabc734055f1037725ec803389e253e68e333759ec6178e8ff9eb7337d21953de1c87f8355a5ef8fe
-
SSDEEP
1536:YASpbWTPEOtOnNootu9uP70xoe5GJFsb70B077:xyTYuP70xLQ3sb706
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5aa9d062c474e44580616603b14f07a_JaffaCakes118
Files
-
b5aa9d062c474e44580616603b14f07a_JaffaCakes118.exe windows:6 windows x86 arch:x86
3324f083f6c5dc4b75b24e52f7b0ad15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileMappingW
InitializeCriticalSection
HeapSetInformation
InitializeCriticalSectionAndSpinCount
MapViewOfFile
SetUnhandledExceptionFilter
GetCommandLineW
SearchPathW
FindResourceW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
LoadLibraryExW
FindResourceExW
LoadResource
GetSystemWindowsDirectoryW
CreateFileW
ActivateActCtx
ReleaseActCtx
CreateActCtxW
GetLocaleInfoW
OpenEventW
CreateEventW
LoadLibraryW
GetProcAddress
FreeLibrary
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GlobalFree
DeleteCriticalSection
SetLastError
CreateProcessW
OpenProcess
GetLastError
CloseHandle
GetModuleHandleW
UnmapViewOfFile
GetTempPathW
GetTickCount
GetTempFileNameW
SetEvent
GetVersionExW
DeactivateActCtx
GetModuleFileNameW
gdi32
CreateFontIndirectW
GetObjectW
SetTextColor
SetBkMode
DeleteObject
Polyline
SelectObject
CreatePen
user32
GetWindowLongW
GetAncestor
GetParent
SendMessageW
PostQuitMessage
PeekMessageW
DispatchMessageW
TranslateMessage
MsgWaitForMultipleObjects
DialogBoxParamW
PostMessageW
MessageBoxW
EndDialog
ShowWindow
SetWindowPos
GetDlgItem
EnableWindow
LoadStringW
SetWindowTextW
GetSysColorBrush
FillRect
DrawIconEx
GetSysColor
SetDlgItemTextW
LoadImageW
LoadIconW
SendDlgItemMessageW
SetWindowLongW
msvcrt
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
memcpy
?terminate@@YAXXZ
_controlfp
??_U@YAPAXI@Z
??2@YAPAXI@Z
??_V@YAXPAX@Z
??3@YAXPAX@Z
memset
_vsnwprintf
_wcsnicmp
_wcsicmp
wcsncmp
_unlock
__dllonexit
_lock
_onexit
bsearch
ntdll
RtlUnwind
shlwapi
ord219
ord172
ord437
SHStrDupW
PathFindFileNameW
PathRemoveFileSpecW
PathAppendW
PathQuoteSpacesW
StrCmpW
ord158
StrToIntW
shell32
SHGetDesktopFolder
ExtractIconExW
CommandLineToArgvW
ord152
ord17
ord28
ord16
SHCreateShellItem
dbghelp
MiniDumpWriteDump
MiniDumpReadDumpStream
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
SysAllocString
ole32
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CreateBindCtx
shdocvw
ord159
iertutil
ord32
sfc
SfcIsFileProtected
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE