d:\vteo\maemy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b6bd1b479eba2fc14f5f195114cf73d2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b6bd1b479eba2fc14f5f195114cf73d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6bd1b479eba2fc14f5f195114cf73d2_JaffaCakes118
-
Size
476KB
-
MD5
b6bd1b479eba2fc14f5f195114cf73d2
-
SHA1
d9a1b35bb18a561b762528548e7cbfb5f2f7502a
-
SHA256
88c5fcc9f09a6793e117082f6c0e7d4502df28d1f091f84fb93a04a4ce226d52
-
SHA512
7d5d5bf5013e78a19753e23e1266e451275c7d15d7e5a3d3f1daede8f5496629ac45569c1d368ed57152b7de48aa8160ddea46ca2705310cc04b6c0453c0c6f1
-
SSDEEP
12288:Pc6+SKgDYB6z34tXe21FAAPfWibc0Ex1y9Z6q0G:PcnSKRB674hh1FA2fzI0Qy9s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6bd1b479eba2fc14f5f195114cf73d2_JaffaCakes118
Files
-
b6bd1b479eba2fc14f5f195114cf73d2_JaffaCakes118.exe windows:4 windows x86 arch:x86
f343965bac758ae3a6f399d5bdbab815
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
StretchBlt
RestoreDC
MaskBlt
CreateBitmap
CreateCompatibleBitmap
GetTextAlign
StartDocA
SetAbortProc
Polygon
GetWindowOrgEx
FillRgn
SetTextColor
SetStretchBltMode
CreateRoundRectRgn
SetWindowOrgEx
GetTextMetricsA
GetTextExtentPoint32A
SetPolyFillMode
CreatePen
SetMapMode
ExcludeClipRect
CreateFontA
FrameRgn
GetCurrentPositionEx
GetBoundsRect
Rectangle
GetDeviceCaps
CombineRgn
GetPaletteEntries
DeleteDC
Escape
BitBlt
GetGlyphOutlineA
PatBlt
ExtCreatePen
GetPolyFillMode
DeleteObject
SetROP2
EndDoc
StartPage
RectVisible
SaveDC
GetObjectA
SelectObject
GetMapMode
ExtFloodFill
OffsetRgn
GetClipBox
GetStretchBltMode
SetWindowExtEx
GetTextCharsetInfo
OffsetWindowOrgEx
DPtoLP
CreateDIBSection
IntersectClipRect
CreateDCA
SetRectRgn
SetPixelV
ExtCreateRegion
EndPage
OffsetClipRgn
comctl32
_TrackMouseEvent
ImageList_SetImageCount
ImageList_AddMasked
InitCommonControlsEx
user32
GetNextDlgTabItem
MessageBeep
InflateRect
LoadBitmapA
IsWindowVisible
GetWindowLongA
SetParent
GetCursorPos
SendMessageA
SetTimer
ReleaseDC
ScreenToClient
BeginDeferWindowPos
MapWindowPoints
DefWindowProcA
PeekMessageA
GetDlgItem
EmptyClipboard
DestroyWindow
KillTimer
DestroyIcon
SetRect
AppendMenuA
EnableWindow
InvalidateRect
OpenClipboard
GetNextDlgGroupItem
SetFocus
GetSystemMetrics
SetCursor
InvalidateRgn
GetClassLongA
CharNextA
GetCapture
RegisterClassA
RedrawWindow
GetActiveWindow
GetScrollInfo
GetDC
UnhookWindowsHookEx
GetClientRect
IsDialogMessageA
EndDeferWindowPos
wsprintfA
RegisterClassExA
EndDialog
SetMenuItemInfoA
UnregisterClassA
GetMenuItemID
MessageBoxA
GetSystemMenu
GetClassInfoA
SystemParametersInfoA
WindowFromPoint
GetWindowTextLengthA
kernel32
GetUserDefaultLCID
HeapCreate
IsValidLocale
GetStringTypeA
GetEnvironmentStrings
GetOEMCP
InterlockedIncrement
VirtualQuery
InterlockedDecrement
HeapDestroy
LoadLibraryA
HeapReAlloc
GetTimeZoneInformation
GetModuleHandleA
FreeEnvironmentStringsA
QueryPerformanceCounter
CreateMutexA
EnterCriticalSection
GetLocaleInfoW
MultiByteToWideChar
FlushFileBuffers
VirtualFree
FreeLibrary
LCMapStringA
LeaveCriticalSection
GetConsoleCP
TlsSetValue
IsDebuggerPresent
GetProcAddress
WriteConsoleW
GetCPInfo
GetConsoleOutputCP
GetTickCount
TlsGetValue
HeapSize
TlsAlloc
FatalAppExitA
GetCommandLineA
GetCurrentProcessId
VirtualAlloc
UnhandledExceptionFilter
SetFilePointer
SetUnhandledExceptionFilter
GetLocaleInfoA
GetSystemTimeAsFileTime
TerminateProcess
GetVersionExA
RtlUnwind
GetCurrentThread
TlsFree
SetStdHandle
GetFileType
InitializeCriticalSection
GetCurrentProcess
GetStdHandle
CompareStringW
EnumSystemLocalesA
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
IsValidCodePage
Sleep
WriteConsoleA
GetTimeFormatA
WriteFile
SetLastError
GetStartupInfoA
GetProcessHeap
ReadFile
GetLastError
GetCurrentThreadId
HeapAlloc
CloseHandle
GetModuleFileNameA
GetACP
DeleteCriticalSection
RaiseException
LCMapStringW
GetConsoleMode
ExitProcess
HeapFree
WideCharToMultiByte
SetHandleCount
InterlockedExchange
GetDateFormatA
GetEnvironmentStringsW
GetStringTypeW
CreateFileA
CompareStringA
winspool.drv
ClosePrinter
ord204
OpenPrinterA
oleaut32
LoadTypeLi
advapi32
SetSecurityDescriptorDacl
RegDeleteKeyA
RegCloseKey
RegQueryValueA
LookupPrivilegeValueA
RegQueryValueExA
RegOpenKeyExA
RegSetValueA
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ