I:\fxhatiqwa\HvpbvxHTlmiCg\ttYDBooOMtt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b73b8cd9d6c3e3345a79b3aaa6baca36_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b73b8cd9d6c3e3345a79b3aaa6baca36_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b73b8cd9d6c3e3345a79b3aaa6baca36_JaffaCakes118
-
Size
147KB
-
MD5
b73b8cd9d6c3e3345a79b3aaa6baca36
-
SHA1
c22736205ed0328dc3e49078ec9637b26096a796
-
SHA256
5f30acd3ec7466ca485e4ccbb2895cd84eaaad7b3eea370909b51a3c6fc84f60
-
SHA512
afd529a9de869bbae84f46db90968027c84eadb359930fc0c296729517c827a48e988ca1a3f802165c29581d2b4756919cd0c4dedd5ec0956016507c4e401069
-
SSDEEP
3072:qLR2qJvqWERz13CEB09G81wuYGUo1V/mYa/2YnQ3gSR9WBNjdsd6s:wsCy7O9GOam1V/y/SWBNjdsd6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b73b8cd9d6c3e3345a79b3aaa6baca36_JaffaCakes118
Files
-
b73b8cd9d6c3e3345a79b3aaa6baca36_JaffaCakes118.exe windows:5 windows x86 arch:x86
8a942d9bdfc0225a796ca87c89053d65
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetWindowRect
CopyRect
GetClassInfoExW
IsCharLowerA
SendMessageW
GetWindow
GetScrollRange
GetClipCursor
LoadCursorA
KillTimer
GetMonitorInfoW
GetMessageA
LookupIconIdFromDirectory
GetMenu
CallWindowProcA
ScrollWindow
GetMenuStringA
wvsprintfA
CharNextA
OpenDesktopW
TrackPopupMenu
SetTimer
IsChild
ShowWindowAsync
GetMenuItemID
SetMenu
GetMenuCheckMarkDimensions
InvalidateRgn
CreateDialogIndirectParamW
CreateIconIndirect
SetWindowPlacement
SetDlgItemInt
AdjustWindowRectEx
GetUpdateRect
GetClassInfoA
InvalidateRect
LoadBitmapW
SetDlgItemTextA
GetClassLongW
GetAltTabInfoW
DestroyIcon
CharNextExA
ClientToScreen
DeleteMenu
GetDC
TranslateAcceleratorW
ValidateRect
GetMessagePos
GetTopWindow
GetWindowLongA
SendMessageTimeoutA
ShowOwnedPopups
GetWindowLongW
EnableMenuItem
LoadImageA
ShowCaret
DestroyWindow
LoadStringW
InsertMenuW
GetDlgCtrlID
DrawFrameControl
WaitForInputIdle
GetMenuItemRect
DestroyCaret
GetMenuItemInfoW
DefFrameProcA
MessageBoxA
DrawFocusRect
CharLowerW
CreateDialogParamW
RegisterClassExW
CharNextW
PostThreadMessageA
ShowWindow
OpenIcon
SetRect
EnumWindows
LoadCursorW
SetMenuItemBitmaps
FindWindowA
RedrawWindow
MapWindowPoints
GetDoubleClickTime
DefDlgProcW
SetRectEmpty
DialogBoxParamA
SendDlgItemMessageW
CharUpperBuffA
InternalGetWindowText
GetClassInfoW
keybd_event
PostMessageW
IsWindowUnicode
DefFrameProcW
GetDlgItem
GetSystemMetrics
RegisterClassW
ToUnicodeEx
DialogBoxIndirectParamW
OemToCharBuffA
DrawStateA
BeginPaint
CreateCaret
wvsprintfW
PostThreadMessageW
MapVirtualKeyA
SetCursor
GetClassNameW
SystemParametersInfoW
MonitorFromRect
IsWindow
IsCharAlphaNumericW
CopyAcceleratorTableW
SetWindowPos
GetSubMenu
SetDlgItemTextW
CreatePopupMenu
ChildWindowFromPointEx
IsRectEmpty
GetKeyboardLayoutList
CreateCursor
InSendMessage
comdlg32
ReplaceTextW
ChooseColorW
CommDlgExtendedError
PrintDlgExW
ChooseFontW
kernel32
FindFirstFileW
SetFileTime
CallNamedPipeW
IsValidLocale
VirtualProtect
SetCurrentDirectoryA
CancelWaitableTimer
LoadLibraryW
CreateDirectoryW
SetupComm
EnumResourceNamesA
ReleaseSemaphore
FindNextFileA
AddAtomA
CreateRemoteThread
GetAtomNameA
GetStartupInfoA
CancelIo
GetCommConfig
HeapUnlock
LocalSize
VirtualQuery
GetCurrentThread
GetModuleHandleA
ClearCommError
GetACP
DeleteFileW
GetSystemWindowsDirectoryW
GetSystemDefaultUILanguage
FindResourceExW
GetCurrentThreadId
CreateNamedPipeA
GetHandleInformation
TlsFree
SetPriorityClass
GetTimeZoneInformation
DeviceIoControl
CompareFileTime
IsBadStringPtrW
GetModuleFileNameW
CreateEventA
HeapFree
SetEndOfFile
GlobalGetAtomNameW
VerifyVersionInfoW
GlobalAddAtomA
GetTempPathW
LCMapStringA
SetErrorMode
GetModuleHandleW
GetShortPathNameA
LocalFree
SetCommMask
FindCloseChangeNotification
GetThreadTimes
SuspendThread
gdi32
SetBkColor
SetViewportExtEx
SetAbortProc
CreateDiscardableBitmap
Rectangle
GetObjectA
GetClipBox
GetROP2
RemoveFontResourceW
TranslateCharsetInfo
SetPixel
EndPath
GetMapMode
GetPaletteEntries
Ellipse
PathToRegion
GetTextExtentPointW
StretchDIBits
ScaleWindowExtEx
GetObjectW
SetBitmapDimensionEx
ExcludeClipRect
SetPaletteEntries
SetWindowOrgEx
MoveToEx
GetTextMetricsA
CreateHalftonePalette
RealizePalette
CreateRectRgn
GetTextColor
DPtoLP
CreateCompatibleDC
StartPage
OffsetViewportOrgEx
SetWindowExtEx
LineTo
PtInRegion
TextOutA
LPtoDP
GetTextMetricsW
CreateRectRgnIndirect
StartDocW
GetRgnBox
ScaleViewportExtEx
RectVisible
GetWindowOrgEx
GetTextAlign
StretchBlt
RectInRegion
CreateICW
CreateRoundRectRgn
msvcrt
_controlfp
__set_app_type
clearerr
wcstoul
fgets
wcsncmp
__p__fmode
remove
__p__commode
isupper
fputc
atoi
wcsncpy
gets
puts
_amsg_exit
time
strcoll
towlower
iswxdigit
_initterm
sprintf
strtok
_acmdln
system
exit
mbtowc
setvbuf
bsearch
ungetc
atol
wcscspn
strrchr
ftell
strtoul
_ismbblead
_XcptFilter
_exit
_cexit
fgetc
strncmp
wcstombs
__setusermatherr
strncpy
clock
fseek
__getmainargs
wcslen
Exports
Exports
?SendHeightNew@@YGXPAKJK]A
?BitCounterArrayIdeDunAs@@YGKGE@Z
?CallScreen@@YGPAFPAI]A
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ