IMEGEN.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bdaa5f10a51108c2b42bc97c0a57920c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdaa5f10a51108c2b42bc97c0a57920c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bdaa5f10a51108c2b42bc97c0a57920c_JaffaCakes118
-
Size
210KB
-
MD5
bdaa5f10a51108c2b42bc97c0a57920c
-
SHA1
f2cea75a129ebe5f3848d21b94b1f05fb5436279
-
SHA256
c9dab1cbf652574bd8044c18ac80f6387a5535729d4a7b8723c503e9d2cd0733
-
SHA512
f7b191b04cdc0bb8beada7936b4a9e6d90cf13b87b6fbd8e52988de247dc2d2268adf1be1e223fbe20f3b1399a8ea5a23ea4f9d1b244f87642f570cc249bfff4
-
SSDEEP
6144:skT69j7VSO5+7JEtEnT8AyOZR+jdLkEJgsiP5RIkDA5IpTXYGR98jHt:skT6XCJEtET8bOb+jdLkEJgsiP5RIkDw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bdaa5f10a51108c2b42bc97c0a57920c_JaffaCakes118
Files
-
bdaa5f10a51108c2b42bc97c0a57920c_JaffaCakes118.exe windows:5 windows x86 arch:x86
e6bc2a014df7cdab9105074dc273a28f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetSaveFileNameW
GetOpenFileNameW
GetFileTitleW
imm32
ImmInstallIMEW
user32
GetFocus
LoadIconW
RegisterClassW
DefWindowProcW
GetWindowLongW
GetClientRect
BeginPaint
GetSysColor
EndPaint
LoadCursorW
SetCursor
InvalidateRect
MessageBoxW
wsprintfW
MessageBeep
DialogBoxParamW
PostMessageW
GetWindow
LoadStringW
CheckDlgButton
EndDialog
SetFocus
SetWindowLongW
CallWindowProcW
EnableWindow
GetDlgItem
GetDlgItemTextW
GetDlgItemInt
IsDlgButtonChecked
SendDlgItemMessageW
SetDlgItemTextW
SetDlgItemInt
CheckRadioButton
GetParent
SendMessageW
kernel32
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
GetModuleHandleA
ExitProcess
HeapAlloc
HeapFree
GetFileAttributesA
GetFileAttributesW
GetVersionExA
GetCommandLineA
GetStartupInfoA
LoadLibraryA
lstrlenW
GlobalUnlock
GlobalLock
CopyFileW
GetSystemDirectoryW
lstrcatW
lstrcpyW
GlobalFree
GlobalAlloc
GetWindowsDirectoryW
lstrcmpiW
CreateThread
TerminateThread
GetFileInformationByHandle
CloseHandle
SuspendThread
WriteFile
ReadFile
VirtualProtect
MoveFileW
DeleteFileW
LocalFree
LocalUnlock
LocalLock
LocalAlloc
CreateFileW
GlobalReAlloc
GetLastError
SetEndOfFile
WideCharToMultiByte
LockResource
LoadResource
FindResourceW
_lclose
UpdateResourceW
_lread
_llseek
GetFileSize
OpenFile
EndUpdateResourceW
BeginUpdateResourceW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetSystemInfo
VirtualQuery
MultiByteToWideChar
LCMapStringA
LCMapStringW
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
InterlockedExchange
GetLocaleInfoA
SetFilePointer
HeapReAlloc
GetStringTypeA
GetStringTypeW
ResumeThread
GetProcAddress
gdi32
CreateSolidBrush
CreatePen
SelectObject
DeleteObject
Rectangle
advapi32
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegEnumValueW
RegCreateKeyW
RegOpenKeyW
RegCloseKey
comctl32
PropertySheetW
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE