L:\htatohLOQg\tfCmjvhjvab\PzBMVVk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bd7cfe94ea0cd7959028c178d55cc19d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bd7cfe94ea0cd7959028c178d55cc19d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd7cfe94ea0cd7959028c178d55cc19d_JaffaCakes118
-
Size
147KB
-
MD5
bd7cfe94ea0cd7959028c178d55cc19d
-
SHA1
5e1a9c09f61c3babb91fab9a8e7a094c8e8cd01e
-
SHA256
a219068d528d28ab3ebad95ce535bc7223881758764f794ead7485be0959ae7c
-
SHA512
217396385b0e98529d4c04825babcf52a92b4fa5f208f0631fb89502d06b750778cfb49b44a6bfcf9aff670bf51c638e5a95317240307a4c86acbe7e0c77b68a
-
SSDEEP
3072:sdRdVEcv0Kh7kFe1uVXuIgcTVHDBnqSaOzL:sdOc8s+uuVeIjjVqSaOzL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd7cfe94ea0cd7959028c178d55cc19d_JaffaCakes118
Files
-
bd7cfe94ea0cd7959028c178d55cc19d_JaffaCakes118.exe windows:5 windows x86 arch:x86
7181ce2e0e6ecd091b0c2db3d18b056a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
PropertySheetW
CreateStatusWindowW
ImageList_Read
ImageList_Remove
ImageList_GetImageCount
CreatePropertySheetPageW
user32
LoadCursorW
GetUserObjectInformationA
CreateCaret
CharNextA
IsCharAlphaNumericW
CreateAcceleratorTableW
GetSystemMenu
GetActiveWindow
CreateDialogIndirectParamW
DeferWindowPos
SetWindowTextW
ValidateRect
CharUpperBuffW
GetClassInfoExW
MoveWindow
LoadMenuW
HiliteMenuItem
LookupIconIdFromDirectory
LoadMenuA
MessageBoxExA
IsChild
OffsetRect
IsZoomed
CreateCursor
KillTimer
GetSubMenu
LoadBitmapA
GetKeyNameTextW
GetAltTabInfoW
GetMenuItemCount
SetActiveWindow
CreateDialogParamA
RegisterWindowMessageW
SystemParametersInfoW
CheckMenuItem
SetWindowRgn
PostQuitMessage
DestroyCaret
GrayStringW
GetClassLongA
CopyRect
SetWindowLongA
ShowOwnedPopups
SetPropW
GetFocus
IsWindowEnabled
IsWindow
DeleteMenu
GetCaretPos
ChildWindowFromPoint
GetMessageExtraInfo
InflateRect
GetScrollRange
TabbedTextOutW
SetRectEmpty
SetScrollInfo
DialogBoxIndirectParamA
DestroyAcceleratorTable
MonitorFromPoint
GetMenu
GetWindowRect
GetMenuCheckMarkDimensions
ChildWindowFromPointEx
CharLowerA
BringWindowToTop
GetSystemMetrics
GetCursorPos
GetMenuStringA
CharLowerBuffW
DispatchMessageA
SendInput
SendMessageA
RegisterHotKey
InSendMessageEx
CloseDesktop
SetDlgItemTextW
RegisterWindowMessageA
IsCharLowerA
GetMessagePos
InvalidateRect
mouse_event
CheckDlgButton
GetMenuItemInfoW
OemToCharBuffA
VkKeyScanW
DrawFocusRect
DispatchMessageW
CharLowerW
ExitWindowsEx
EqualRect
TranslateAcceleratorA
OpenInputDesktop
ClientToScreen
SystemParametersInfoA
DrawTextExW
InvalidateRgn
DefWindowProcA
SetWindowPlacement
FindWindowExA
EnumWindows
InsertMenuA
RegisterClassA
TranslateAcceleratorW
AttachThreadInput
MapVirtualKeyExW
DialogBoxParamW
MessageBoxA
CharToOemBuffA
RemoveMenu
IsDlgButtonChecked
SetWindowTextA
EnableWindow
CreateIconIndirect
ShowScrollBar
EnumChildWindows
DrawFrameControl
CharToOemA
IsCharAlphaW
UnloadKeyboardLayout
comdlg32
PrintDlgExW
GetSaveFileNameA
GetOpenFileNameA
GetSaveFileNameW
msvcrt
iswprint
puts
strtok
islower
_controlfp
free
__set_app_type
vswprintf
fread
malloc
__p__fmode
__p__commode
iswspace
_amsg_exit
strcspn
sscanf
remove
_initterm
atol
_acmdln
exit
_ismbblead
wcscat
strcpy
time
_XcptFilter
_exit
getc
wcstombs
isalnum
wcscmp
wcstok
_cexit
localtime
__setusermatherr
strtol
mbtowc
wcslen
isxdigit
toupper
perror
isprint
vsprintf
fgetc
__getmainargs
mbstowcs
towupper
putc
strncmp
kernel32
SetFileAttributesA
VirtualQuery
GetTickCount
FindFirstChangeNotificationW
IsValidLocale
GetComputerNameA
DefineDosDeviceW
FlushViewOfFile
OpenFile
FileTimeToSystemTime
SetCommMask
SetCurrentDirectoryW
WaitForSingleObjectEx
LoadLibraryExW
GetFileAttributesExA
ConvertDefaultLocale
GlobalHandle
EscapeCommFunction
LoadLibraryA
AreFileApisANSI
GetSystemTimeAdjustment
GetFileAttributesExW
GetFileAttributesA
GetFileType
WaitForMultipleObjectsEx
ResumeThread
GlobalGetAtomNameW
GetModuleFileNameW
IsDBCSLeadByte
lstrcpyA
GetHandleInformation
IsDBCSLeadByteEx
GetComputerNameExA
GlobalSize
LoadLibraryW
SetCommBreak
FreeLibrary
MoveFileW
RemoveDirectoryW
LeaveCriticalSection
TerminateThread
GetProcAddress
ExitThread
GetCurrentThreadId
GetOEMCP
EnumResourceNamesW
ReleaseSemaphore
ClearCommError
LCMapStringA
GetUserDefaultLCID
GetBinaryTypeW
gdi32
TextOutW
StartDocW
DPtoLP
SetBkColor
CreateEllipticRgnIndirect
CreateICW
CreateCompatibleBitmap
WidenPath
SetLayout
SelectObject
SetROP2
GetTextExtentPointA
CreateFontA
GetTextExtentExPointW
GetBitmapBits
CreateFontIndirectA
CreateRectRgnIndirect
CreateHalftonePalette
CreateFontIndirectW
GetROP2
LineDDA
GetWindowOrgEx
SetRectRgn
Rectangle
RectVisible
CreateDIBSection
SetAbortProc
CreateFontW
GetTextExtentPoint32W
GetStockObject
OffsetViewportOrgEx
StretchBlt
SetDIBits
SetBrushOrgEx
CreatePatternBrush
SetTextColor
MoveToEx
EnumFontsW
CreateDIBitmap
RectInRegion
TranslateCharsetInfo
CreateDCW
PathToRegion
GetDIBits
GetTextFaceW
EnumFontFamiliesW
SetTextAlign
GetCurrentObject
Exports
Exports
?BitCounterArrayIdeDunAs@@YGKGE@Z
Sections
.text Size: 9KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE