OInfoP11.pdb
Static task
static1
Behavioral task
behavioral1
Sample
baafc15158ce52135c0037e157ec497e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
baafc15158ce52135c0037e157ec497e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
baafc15158ce52135c0037e157ec497e_JaffaCakes118
-
Size
185KB
-
MD5
baafc15158ce52135c0037e157ec497e
-
SHA1
eed96418e3eafc615f403433da9f1f5dc2d27d00
-
SHA256
6d7fc122911c2f96be67b5893d2341973ca43597edb5f40bba1a3181d8c1d40a
-
SHA512
4c111ed1a351a154c534cd6a6fa7a77ad453550a9c6536b2099fe39fab2978f9334c5ee860f7d7602e8698150cc996a9b370daecfb39fe37751935edbf9b90de
-
SSDEEP
3072:ykwIGVp/saloMf+lI8JfIg+oF2JWv9Iy88CUcYRyzO0+KSV:OlZfgIg+ocGpvcUnF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource baafc15158ce52135c0037e157ec497e_JaffaCakes118
Files
-
baafc15158ce52135c0037e157ec497e_JaffaCakes118.exe windows:4 windows x86 arch:x86
0f88201de4585105b4340358cec0c9e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
oinfo11.ocx
GetOfficeData
DeleteOfficeData
kernel32
GetCommandLineA
GetModuleHandleA
LoadLibraryExA
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
SetEvent
IsDBCSLeadByte
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GetModuleFileNameA
lstrcpynA
CreateEventA
CreateThread
Sleep
WaitForSingleObject
CloseHandle
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetStartupInfoA
SetLastError
GetModuleHandleW
GetProcAddress
GetFileAttributesW
LoadLibraryW
GetModuleFileNameW
OutputDebugStringA
LocalAlloc
LocalFree
GlobalLock
GlobalReAlloc
GlobalUnlock
GlobalHandle
GlobalAlloc
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
GlobalFree
LoadLibraryA
lstrcmpW
lstrcatA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpA
GlobalFlags
lstrcpyA
GetCPInfo
GetOEMCP
GetCurrentProcess
user32
SetWindowTextA
ClientToScreen
DestroyMenu
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
PostQuitMessage
RemovePropA
GetWindowTextA
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
GetClassInfoA
CreateWindowExA
GetClassInfoExA
RegisterClassA
SetForegroundWindow
GetMenu
PostMessageA
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
CopyRect
SetWindowLongA
SetWindowPos
PtInRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SetWindowsHookExA
CallNextHookEx
GetKeyState
PeekMessageA
ValidateRect
GetMenuState
GetMenuItemID
UnregisterClassA
CharUpperA
GetMenuItemCount
UnhookWindowsHookEx
SendMessageA
MessageBoxA
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
DispatchMessageA
TranslateMessage
GetMessageA
PostThreadMessageA
CharNextA
GetClientRect
GetPropA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
GetSubMenu
advapi32
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
shlwapi
PathFindExtensionA
ole32
CoCreateInstance
StringFromGUID2
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoRegisterClassObject
CoRevokeClassObject
CoInitialize
oleaut32
VariantInit
VariantChangeType
SysStringLen
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
VarUdateFromDate
VarBstrFromDate
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElement
VariantClear
SysAllocStringLen
SysFreeString
msvcrt
realloc
_CxxThrowException
malloc
_controlfp
??1type_info@@UAE@XZ
ctime
mktime
gmtime
localtime
time
_vsnwprintf
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
free
_except_handler3
_vsnprintf
memmove
_acmdln
exit
_cexit
_ismbblead
_wcsicmp
_XcptFilter
_exit
_c_exit
_mbctype
_expand
_mbscmp
_msize
__CxxFrameHandler
memcpy
memset
strftime
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
DeleteObject
ExtTextOutA
SaveDC
RestoreDC
SetMapMode
GetDeviceCaps
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
Exports
Exports
_ctime64
_gmtime64
_localtime64
_mktime64
_resetstkoflw
_scprintf
_scwprintf
_time64
_vscprintf
_vscwprintf
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1data Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE