W:\qKlnznkXh\jpLkjerlj\iPcshjuyJ.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b6732421389d72b21b6f006d02e9537b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b6732421389d72b21b6f006d02e9537b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6732421389d72b21b6f006d02e9537b_JaffaCakes118
-
Size
201KB
-
MD5
b6732421389d72b21b6f006d02e9537b
-
SHA1
be48f65398d7cfc4de376c7d8d71bbfe83d48970
-
SHA256
6eede2c7120ea66092c829a9f542fe752baa6a00ece10ed85a268d56de80f5e3
-
SHA512
8728247058c7b4aa8c06757915821762954a1e268db976d869a796cc0fe394c7aae9645d056c1d8e4e1014929167e48730a51b97fd0f6cd81bd6ec7ab1a9a529
-
SSDEEP
6144:+ShwenVlufTbZxCi4GxrotrKuEWjQKeVE2:+ShvneZreEWjQr/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6732421389d72b21b6f006d02e9537b_JaffaCakes118
Files
-
b6732421389d72b21b6f006d02e9537b_JaffaCakes118.exe windows:5 windows x86 arch:x86
83cdb40d1cd8b60ff91450e2f24bdbcf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetOpenFileNameW
ChooseColorW
ChooseFontW
kernel32
lstrcpynW
FindNextFileA
SetFileApisToOEM
SetFileAttributesA
DeviceIoControl
HeapCreate
CompareStringA
GetSystemTimeAsFileTime
lstrcatW
lstrlenA
SetFilePointer
GetModuleHandleA
FileTimeToSystemTime
LoadLibraryW
GetShortPathNameW
GetModuleHandleW
ConnectNamedPipe
FindResourceExA
FindResourceW
GetVersionExA
shlwapi
StrCatBuffW
comctl32
InitCommonControlsEx
ImageList_GetIcon
ImageList_GetImageCount
ImageList_Destroy
ImageList_Remove
msvcrt
_controlfp
__set_app_type
atoi
__p__fmode
strncpy
__p__commode
_amsg_exit
malloc
isspace
_initterm
_acmdln
exit
_ismbblead
gets
_XcptFilter
free
fflush
_exit
strchr
_cexit
wcstoul
__setusermatherr
fprintf
fgets
__getmainargs
fputs
gdi32
GetNearestPaletteIndex
AddFontResourceW
CreateFontIndirectW
CreateDIBitmap
Escape
GetTextFaceW
GetLayout
Ellipse
CreateEllipticRgnIndirect
SetDIBitsToDevice
RealizePalette
GetPixel
EndPath
CreateCompatibleDC
SetMapMode
SelectPalette
ExtFloodFill
user32
GetDC
IsWindowEnabled
OpenDesktopW
ShowWindowAsync
SetActiveWindow
RemoveMenu
MapVirtualKeyA
GetWindowTextLengthW
PeekMessageA
GetParent
TabbedTextOutW
IsDlgButtonChecked
InsertMenuW
CreateWindowExW
SetWindowRgn
IsCharAlphaNumericA
SendNotifyMessageW
FindWindowExA
CreateMenu
CreateDialogIndirectParamW
MonitorFromRect
CopyRect
OemToCharBuffA
GetClassLongA
CharLowerW
DeleteMenu
DefFrameProcA
DefWindowProcA
MapVirtualKeyW
OpenIcon
CheckDlgButton
mouse_event
wsprintfW
FillRect
LoadStringW
LoadIconA
CallWindowProcA
CharUpperBuffA
LoadBitmapW
DrawMenuBar
DestroyWindow
DestroyAcceleratorTable
Exports
Exports
?GenerateTimeOriginal@@YGXPAH~U
?ExecuteLoaderTrayXBwyGD@@YGKGHE@Z
?FormatMutex@@YGPADPAIJNM~U
?CopyAppNameW@@YGPAMPAEHPADPAH~U
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticx Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kip Size: 1024B - Virtual size: 516B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticy Size: 512B - Virtual size: 351B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.heap Size: - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ