T:\yRMfhCYlBd\usXDgmh\fsQwPmkTpqo\uinvyiw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b89f6788a53196b23c1fba7adc684414_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b89f6788a53196b23c1fba7adc684414_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b89f6788a53196b23c1fba7adc684414_JaffaCakes118
-
Size
64KB
-
MD5
b89f6788a53196b23c1fba7adc684414
-
SHA1
bf7196f16ad16cc7cd3b3011d5c6a29b9587dbca
-
SHA256
30737ccff8def68ae0c183caae8b2c483ecb4c4a4fa19a999a5ab12666e2a50e
-
SHA512
d82db45f380ab638c349c43e13c2f3c6dacd3806ca1d19a834f8dcd0bc58e546692b4e727c4aa114786a225ebb7dc49f1af84b831c3ad7e6aef458fe5ba01622
-
SSDEEP
768:p+jQbpOhCU/JefrPjHgYaO/CSCMC0rWIAbpAtxUr6UXFZrwohHn8lX3PinPlo8hq:p+jQbU4fHXHCMWX5XP5GXqquusal4o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b89f6788a53196b23c1fba7adc684414_JaffaCakes118
Files
-
b89f6788a53196b23c1fba7adc684414_JaffaCakes118.exe windows:5 windows x86 arch:x86
b6df18fdd1e885ca8600c5d1693404cd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
StrToIntW
msvcrt
malloc
isalnum
atoi
mbstowcs
_controlfp
setvbuf
iswdigit
system
__set_app_type
__p__fmode
fputc
bsearch
ftell
isprint
wcschr
qsort
getenv
__p__commode
wcsstr
fclose
sprintf
vswprintf
remove
strspn
strrchr
free
strncmp
_amsg_exit
_initterm
strncpy
_ismbblead
_XcptFilter
_exit
isalpha
fseek
rand
gets
wcsrchr
fread
perror
_cexit
strchr
__setusermatherr
wcstoul
fputs
__getmainargs
wcstombs
kernel32
GlobalAddAtomA
SuspendThread
SearchPathW
CreateEventA
LocalUnlock
GetHandleInformation
ResetEvent
CreateWaitableTimerA
GetCommState
SetThreadLocale
LeaveCriticalSection
GetCommandLineW
LockResource
SetSystemTime
GetProcAddress
LoadLibraryA
LocalFree
SetEndOfFile
IsValidLocale
CreateMutexA
GetDateFormatW
HeapReAlloc
SetCommState
FindResourceW
GetThreadTimes
LCMapStringW
SetThreadAffinityMask
FlushFileBuffers
GetFileTime
SetHandleCount
CopyFileW
ClearCommError
IsDBCSLeadByteEx
GetTempPathW
LocalSize
VirtualAlloc
FindResourceExA
GetSystemDefaultUILanguage
VerifyVersionInfoW
FlushViewOfFile
CreateThread
GetUserDefaultLCID
RaiseException
QueryPerformanceCounter
CreateFileMappingW
SetThreadExecutionState
GetFullPathNameA
GetShortPathNameA
GetSystemTimeAsFileTime
lstrlenA
HeapAlloc
GetTempPathA
GetSystemWindowsDirectoryA
comdlg32
GetOpenFileNameW
PrintDlgW
CommDlgExtendedError
ChooseFontW
user32
SendNotifyMessageW
MapDialogRect
CallWindowProcW
CreateCursor
GetActiveWindow
CreateMenu
GetIconInfo
GetMessageW
InsertMenuA
CharUpperA
SetTimer
LoadBitmapW
SetUserObjectInformationW
SetScrollRange
GetParent
RemovePropW
EnumChildWindows
GetWindowTextA
GetDlgItemTextA
GetSystemMetrics
ClipCursor
LoadAcceleratorsW
IsDlgButtonChecked
ScreenToClient
PostQuitMessage
GetWindowDC
GetMenuItemInfoW
SetForegroundWindow
ChangeMenuW
LoadStringW
LockWindowUpdate
FindWindowA
SetWindowLongA
AdjustWindowRect
LoadImageA
DialogBoxParamW
LookupIconIdFromDirectory
UnloadKeyboardLayout
mouse_event
DefDlgProcW
IsCharAlphaNumericW
CharLowerW
PostMessageA
SetSysColors
SetScrollPos
IsIconic
DialogBoxIndirectParamW
PeekMessageA
CharUpperBuffW
SetMenuDefaultItem
EnumThreadWindows
GetKeyNameTextW
IsDialogMessageA
DrawFocusRect
SystemParametersInfoA
FillRect
SetDlgItemTextA
SetWindowPlacement
IntersectRect
SetMenuItemBitmaps
ShowScrollBar
ShowWindow
PostMessageW
ClientToScreen
DrawStateW
GetScrollRange
OemToCharBuffA
IsMenu
DrawEdge
ShowOwnedPopups
FindWindowW
DrawTextW
TranslateMessage
ChildWindowFromPointEx
ExitWindowsEx
GetMonitorInfoW
SetMenu
GetDoubleClickTime
wvsprintfA
CheckMenuItem
CharUpperW
GetWindow
GetMenu
InsertMenuW
LoadCursorW
GetMenuStringW
DrawIcon
MonitorFromRect
ModifyMenuW
MoveWindow
keybd_event
CopyRect
DestroyCaret
InternalGetWindowText
RegisterClassExA
IsCharLowerA
ScrollWindow
TrackPopupMenu
DrawStateA
InSendMessageEx
CopyImage
GetClassLongA
GetSystemMenu
SetDlgItemInt
SetWindowRgn
DialogBoxParamA
SetClassLongW
GetDlgItem
LoadMenuW
IsCharUpperA
CloseDesktop
SetCursorPos
AllowSetForegroundWindow
ShowCursor
SetWindowPos
BeginPaint
SetParent
SetWindowTextA
comctl32
ImageList_Remove
ImageList_ReplaceIcon
ImageList_GetImageCount
ImageList_AddMasked
ImageList_LoadImageW
ImageList_Read
gdi32
DeleteDC
CreateFontIndirectA
GetSystemPaletteUse
SetTextAlign
Ellipse
GetStockObject
FillRgn
PolyBezier
CreatePenIndirect
GetTextExtentPointA
GetLayout
GetTextFaceW
RoundRect
PatBlt
PtVisible
EndPage
SetDIBitsToDevice
CreateBitmapIndirect
StartPage
SetViewportOrgEx
SetROP2
OffsetRgn
CreateBrushIndirect
CreateRectRgnIndirect
StartDocW
SetLayout
GetObjectW
CreateDiscardableBitmap
SetBkMode
GetDeviceCaps
SetPaletteEntries
CreateHatchBrush
CreateBitmap
BeginPath
SetStretchBltMode
SetBitmapDimensionEx
Polyline
GetWindowOrgEx
SetAbortProc
GetCurrentObject
SetBrushOrgEx
GetTextExtentPointW
SetViewportExtEx
CreatePatternBrush
EnumFontFamiliesExW
Escape
GetCharWidth32W
RemoveFontResourceW
Exports
Exports
?GetShiftAltInfo@@YGK_KHE:O
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bit Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.insec Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inmin Size: 512B - Virtual size: 86B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wall Size: 512B - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ