E:\PVFTOQS\EMHT\OKOO\GOAEWKZJSP\EEOR.PDB
Static task
static1
Behavioral task
behavioral1
Sample
bd098ee073744222291b7214892ce58f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd098ee073744222291b7214892ce58f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd098ee073744222291b7214892ce58f_JaffaCakes118
-
Size
684KB
-
MD5
bd098ee073744222291b7214892ce58f
-
SHA1
b4abd15912608580fc46411b7d49b9ad7bcd6269
-
SHA256
11d99cd2dc857cf91a0d290ca0d7ef076d930fe648944357b70d663c2282cf16
-
SHA512
8f789b630694f4e8f5d81c00ddc9f90cb17d09b14272611086f7fa013d7b3ea88b632b249b20f6be4aa02882a6b0cef4e3f4399760f4baddb2b0bafa78c14cbe
-
SSDEEP
12288:hxW+QIdkePCPUcGb/3miXqbfXKIn2wL/nyIL/Oz1r:DZQIdXhcs/WiXqb/EIPWz1r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd098ee073744222291b7214892ce58f_JaffaCakes118
Files
-
bd098ee073744222291b7214892ce58f_JaffaCakes118.exe windows:4 windows x86 arch:x86
550dcf25da50c869bd0a8754cc626605
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DefWindowProcA
GetDlgItem
GetWindowThreadProcessId
GetMenuState
CopyIcon
SetScrollInfo
GetMenu
GetKeyState
GetWindowLongA
SetWindowContextHelpId
IsZoomed
InvertRect
MessageBeep
LoadBitmapA
GetScrollPos
ShowScrollBar
SetTimer
EnumChildWindows
AppendMenuA
LoadCursorA
RegisterClassExA
IsIconic
UpdateWindow
MessageBoxA
TrackPopupMenu
RegisterClassA
IsRectEmpty
PtInRect
SetWindowLongA
InflateRect
IsChild
CheckMenuItem
LoadStringA
SystemParametersInfoA
SetClipboardData
SendDlgItemMessageA
LoadIconA
InsertMenuItemA
IsDlgButtonChecked
CreateAcceleratorTableA
TranslateAcceleratorA
RegisterWindowMessageA
ReleaseCapture
GetMessageA
DestroyIcon
LoadImageA
SetRect
CreateDialogIndirectParamA
WinHelpA
CreatePopupMenu
GetTabbedTextExtentA
IsWindowEnabled
EnableWindow
GetParent
DestroyCursor
DispatchMessageA
GetWindowPlacement
SetCursor
GetCapture
PostQuitMessage
GetWindowRect
ReleaseDC
GetClassLongA
ShowWindow
CallNextHookEx
GetClassNameA
GetSysColor
GetFocus
ClientToScreen
RedrawWindow
GetClassInfoA
SetRectEmpty
DestroyWindow
shell32
ord155
ShellExecuteA
SHGetFolderPathA
kernel32
GetCurrentProcess
WriteFile
GetLastError
lstrcatA
GetLocaleInfoW
SetUnhandledExceptionFilter
GetUserDefaultLCID
Sleep
OutputDebugStringA
MulDiv
GlobalAlloc
SetStdHandle
HeapFree
FreeLibrary
MultiByteToWideChar
GetVersion
CopyFileW
GetProcessHeap
SetEvent
GetCommandLineA
CompareStringA
IsValidLocale
WideCharToMultiByte
GetSystemInfo
GlobalSize
GetSystemDirectoryA
LoadLibraryA
lstrcmpA
ExpandEnvironmentStringsA
SetFileTime
FindResourceA
lstrcpyA
CreateThread
FreeEnvironmentStringsA
IsBadWritePtr
GetProcAddress
GlobalDeleteAtom
LockResource
QueryPerformanceCounter
HeapCreate
EnterCriticalSection
ReadFile
GetSystemTimeAsFileTime
GetFileTime
GlobalHandle
GetDateFormatA
InterlockedDecrement
GetCurrentProcessId
GetStartupInfoA
GetEnvironmentStrings
GetFileType
OpenProcess
FindFirstFileW
HeapReAlloc
GetLocalTime
TlsAlloc
GetStdHandle
GetFileAttributesA
GetModuleFileNameA
GetCurrentThread
GetTimeZoneInformation
IsBadCodePtr
GetCurrentDirectoryA
lstrcpyW
CreateDirectoryW
LCMapStringA
GlobalFlags
TerminateProcess
GetTimeFormatA
GetVersionExA
LeaveCriticalSection
InitializeCriticalSection
SetLastError
LoadResource
CreateMutexA
TerminateThread
LocalAlloc
GetEnvironmentStringsW
ResetEvent
WaitForSingleObject
LocalReAlloc
DeleteCriticalSection
WaitForMultipleObjects
lstrcmpW
DuplicateHandle
ExitProcess
GetDriveTypeA
GlobalReAlloc
GetThreadLocale
UnmapViewOfFile
SetThreadPriority
GlobalLock
SetEnvironmentVariableW
CreateEventW
FreeResource
FileTimeToLocalFileTime
InterlockedExchange
SetHandleCount
CompareStringW
UnlockFile
GetStringTypeA
GetStringTypeW
GetTickCount
lstrlenW
LocalFree
VirtualQuery
FindFirstFileA
VirtualProtect
RaiseException
CreateDirectoryA
ExitThread
CloseHandle
TlsSetValue
FindClose
GlobalFree
GetCurrentDirectoryW
SetEnvironmentVariableA
GetExitCodeThread
GetModuleHandleA
HeapDestroy
FindNextFileW
SetEndOfFile
HeapSize
SetFileAttributesA
GetLocaleInfoA
HeapAlloc
GetSystemTime
GetTempPathW
FlushFileBuffers
GetUserDefaultLangID
GetACP
CreateFileA
IsBadReadPtr
LocalFileTimeToFileTime
FreeEnvironmentStringsW
InterlockedIncrement
LCMapStringW
DeleteFileW
ConvertDefaultLocale
RtlUnwind
InterlockedCompareExchange
ReleaseMutex
GetOEMCP
GlobalUnlock
CreateFileW
FileTimeToSystemTime
VirtualFree
SetFilePointer
GetFullPathNameA
SetErrorMode
DeleteFileA
SizeofResource
LockFile
ResumeThread
GetCPInfo
WinExec
IsValidCodePage
GetModuleHandleW
lstrlenA
CreateProcessA
GetFileSize
lstrcpynW
DeviceIoControl
TlsGetValue
VirtualAlloc
TlsFree
UnhandledExceptionFilter
MapViewOfFile
GetCurrentThreadId
comctl32
CreatePropertySheetPageW
ImageList_Create
ImageList_Draw
InitCommonControlsEx
gdi32
AbortDoc
SetBkMode
GetRgnBox
DPtoLP
EndPage
PlayEnhMetaFile
Chord
GetCharABCWidthsFloatA
EnumObjects
DeleteObject
GdiComment
GetMiterLimit
CreateRectRgn
TextOutA
AngleArc
GetCharWidthFloatA
GetKerningPairsA
CreateBitmap
GetBkMode
GetBrushOrgEx
SetRectRgn
Polygon
CreatePolyPolygonRgn
ResizePalette
PlgBlt
GetWindowOrgEx
GetAspectRatioFilterEx
RectVisible
SelectClipPath
SetMiterLimit
GetPath
CreateEllipticRgnIndirect
WidenPath
GetMapMode
GetColorAdjustment
RoundRect
GetObjectType
FlattenPath
GetTextFaceA
AnimatePalette
EndDoc
PolyBezier
CreateDiscardableBitmap
AbortPath
ExtEscape
SetBrushOrgEx
StartPage
SetAbortProc
CreatePen
LPtoDP
GetTextAlign
ResetDCA
CreateDIBitmap
DrawEscape
Sections
.text Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 464KB - Virtual size: 461KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ