T:\xZokqzqtf\aiReyvh\kmyhkliYzsRzwY\QjogumboTh\lPybtfJbCvPoe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b7c01234ca490c205274b3c893f40585_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b7c01234ca490c205274b3c893f40585_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7c01234ca490c205274b3c893f40585_JaffaCakes118
-
Size
169KB
-
MD5
b7c01234ca490c205274b3c893f40585
-
SHA1
44f3c032e323e2680c713d9b420e7b4357117970
-
SHA256
64a78cb482977eaaef0b379eb3f235d14eabdda94ca8de3e1c373502f45b8608
-
SHA512
d9d3028edb866cf7e8a6996d54cd67c4cb59d033250240510f37c83238e13d5e901257b2d1b3549e83c6d7d43a0b3943bb011a8ff0ec2de85f869fee3b8cf4b9
-
SSDEEP
3072:linl6GwyGnOKCqkE5MkY7g8CbA1AgBfqBvlZMu1x5wSiapTeWhG:lI6nyGnOiyzqRlZMu1JTIMG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7c01234ca490c205274b3c893f40585_JaffaCakes118
Files
-
b7c01234ca490c205274b3c893f40585_JaffaCakes118.exe windows:5 windows x86 arch:x86
55f6d02e5db211139123b89e4e543eb5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
towlower
__set_app_type
wcsncpy
ungetc
__p__fmode
getc
__p__commode
srand
_amsg_exit
_initterm
putc
_acmdln
exit
tolower
fread
wcspbrk
_ismbblead
_XcptFilter
fgetc
wcscpy
_exit
puts
_cexit
__setusermatherr
__getmainargs
strtok
shlwapi
ord29
StrToIntExA
gdi32
SetBitmapBits
EndPage
RealizePalette
ScaleViewportExtEx
StretchBlt
SaveDC
SetStretchBltMode
CreateBitmapIndirect
GetTextExtentPointW
GetMapMode
CreateDCW
GetClipBox
CreateRectRgnIndirect
CreateRectRgn
SetWindowExtEx
CreatePatternBrush
ResizePalette
TextOutA
GetFontData
kernel32
GetSystemWindowsDirectoryW
CreateFileMappingA
SetCommMask
FoldStringW
HeapCreate
SearchPathW
GetThreadContext
GetFullPathNameW
FindResourceA
GetTempPathW
GetModuleHandleA
SetUnhandledExceptionFilter
CreateNamedPipeW
GlobalUnlock
FindFirstChangeNotificationW
GetTickCount
DuplicateHandle
HeapValidate
ConnectNamedPipe
LoadLibraryW
GetCommandLineW
user32
BeginPaint
GetSubMenu
GetPropW
DrawTextA
LoadImageW
DestroyAcceleratorTable
CheckMenuRadioItem
EndPaint
GetKeyboardType
GetDlgItemTextA
GetLastActivePopup
DrawTextW
DispatchMessageW
InternalGetWindowText
SetForegroundWindow
DrawMenuBar
CharNextW
SendNotifyMessageW
MonitorFromRect
GetClassInfoW
EnableMenuItem
GetDlgCtrlID
RemovePropW
IsCharAlphaNumericW
GetKeyboardLayoutNameW
IsCharLowerA
GetAsyncKeyState
SetWindowPlacement
EndDialog
ShowWindowAsync
DispatchMessageA
ShowOwnedPopups
DrawAnimatedRects
SetWindowPos
LoadAcceleratorsA
SendMessageTimeoutW
GetWindowTextLengthW
AppendMenuW
CharLowerBuffW
TileWindows
SendInput
EnumThreadWindows
DestroyCaret
LoadMenuW
SendMessageA
GetUserObjectInformationA
Exports
Exports
?InstallKeyboardExA@@YGPAKPAHGKM~U
?SendWidthNew@@YGFF~U
?DumpDigitalDataCBhJEB@@YGKGHE@Z
?CloseValueNew@@YGXJEPAIPAM~U
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.init Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tedat Size: 512B - Virtual size: 343B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tidat Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alloc Size: - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ