d:\eexsk\aoraaalnr\qrfgdoz\koegglsem\erf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bfce30bf728c4afe9bfc94e5a57e3b50_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bfce30bf728c4afe9bfc94e5a57e3b50_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bfce30bf728c4afe9bfc94e5a57e3b50_JaffaCakes118
-
Size
561KB
-
MD5
bfce30bf728c4afe9bfc94e5a57e3b50
-
SHA1
dc8a42c2a1a8b5ea124b4f8b4b9b3b58f863049c
-
SHA256
17ffee6c25163ff490c53a1d59f456d8b73961fa06d60f12dcddca954f9f54a4
-
SHA512
95654d91cfaa74721ff135e28eb001f599b7b9e5802633019937bcd7e1fed2cca21bb8de1a3850b58ece27d1c1be3ea2ddd34286f376462c7175049fb210d1d0
-
SSDEEP
12288:IofZHwjppH8PPcgTv1GN7CljYo5dTi+9rLuQYN5m:IAHgz83Xntd39rLuQ2M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bfce30bf728c4afe9bfc94e5a57e3b50_JaffaCakes118
Files
-
bfce30bf728c4afe9bfc94e5a57e3b50_JaffaCakes118.exe windows:4 windows x86 arch:x86
0c0dc7931ebd4c5eae50114a938b9c9a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_ReplaceIcon
PropertySheetW
ImageList_Destroy
InitCommonControlsEx
advapi32
RegQueryValueA
OpenThreadToken
RegCreateKeyA
oleaut32
LoadTypeLi
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
kernel32
LCMapStringW
GetStartupInfoA
GetCurrentProcess
GetTempPathW
TlsFree
HeapAlloc
RtlUnwind
lstrcpyA
SetEndOfFile
QueryPerformanceCounter
CreateProcessW
InterlockedCompareExchange
GetTickCount
TerminateProcess
WideCharToMultiByte
SetEvent
FindNextFileW
LeaveCriticalSection
FlushFileBuffers
lstrcpyW
HeapCreate
OpenProcess
GetTimeZoneInformation
LocalAlloc
LoadResource
CreateMutexW
HeapDestroy
FreeEnvironmentStringsW
UnhandledExceptionFilter
lstrcmpW
GetLocalTime
GetOEMCP
GetStringTypeW
GetACP
InterlockedIncrement
CompareStringA
ExitProcess
GetStartupInfoW
CreateDirectoryW
GetExitCodeThread
GetFileAttributesA
GetTimeFormatA
GetCurrentThreadId
InterlockedExchange
HeapReAlloc
GetConsoleOutputCP
SetEnvironmentVariableA
GetWindowsDirectoryW
LoadLibraryW
MultiByteToWideChar
RaiseException
GlobalUnlock
GetProcessHeap
TlsAlloc
GetConsoleMode
GetStringTypeA
WinExec
GetFileType
GetVersionExW
GetCurrentProcessId
MapViewOfFile
lstrlenA
HeapFree
SetHandleCount
DeleteCriticalSection
WriteConsoleA
IsValidCodePage
IsValidLocale
VirtualFree
GlobalLock
GetFileAttributesW
CreateThread
HeapSize
IsDebuggerPresent
CreateDirectoryA
FileTimeToSystemTime
SetUnhandledExceptionFilter
ReleaseMutex
CreateFileW
VirtualProtect
ReadFile
GetEnvironmentStringsW
TlsGetValue
GetModuleFileNameW
GetFileSize
SystemTimeToFileTime
InitializeCriticalSection
GetLastError
GetModuleFileNameA
FreeEnvironmentStringsA
GlobalAlloc
GetModuleHandleW
GetConsoleCP
LockResource
WriteFile
GlobalFree
WriteConsoleW
GetFileTime
GetProcAddress
Sleep
CloseHandle
CompareStringW
GetVersionExA
WaitForSingleObject
GetDateFormatA
EnterCriticalSection
SetLastError
GetCommandLineA
VirtualAlloc
UnmapViewOfFile
CreateFileA
GetCPInfo
MulDiv
GetStdHandle
TlsSetValue
LoadLibraryA
GetCommandLineW
GetEnvironmentStrings
VirtualQuery
IsBadWritePtr
QueryPerformanceFrequency
LCMapStringA
GetLocaleInfoA
SetErrorMode
InterlockedDecrement
GetModuleHandleA
SetStdHandle
SetFilePointer
FreeResource
GetSystemTimeAsFileTime
gdi32
FillRgn
GetTextColor
SetStretchBltMode
CreateRectRgnIndirect
CreateCompatibleBitmap
SaveDC
GetTextExtentPoint32A
EnumFontFamiliesExA
SetViewportExtEx
CombineRgn
PtInRegion
UnrealizeObject
StartPage
EndPage
GetNearestColor
EndDoc
GetBkColor
GetViewportExtEx
Polyline
RestoreDC
GetObjectA
DeleteObject
user32
GetWindowTextLengthW
ReleaseDC
GetForegroundWindow
SendDlgItemMessageW
EndDeferWindowPos
RegisterClipboardFormatW
SetTimer
GetTopWindow
CreatePopupMenu
CopyImage
GetCursorPos
GetMenuStringW
CheckMenuItem
LoadBitmapW
MapWindowPoints
RegisterClassW
EndPaint
IsWindowEnabled
GetSystemMetrics
OpenClipboard
LoadAcceleratorsW
FrameRect
ReleaseCapture
GetDC
InsertMenuW
FillRect
SendMessageW
SetDlgItemTextW
IsMenu
InflateRect
IsIconic
CallWindowProcW
IsClipboardFormatAvailable
RedrawWindow
GetWindowThreadProcessId
GetDesktopWindow
SetDlgItemInt
GetSysColorBrush
SetMenuDefaultItem
GetDlgItem
EqualRect
CharUpperW
PeekMessageW
IsWindowVisible
IsWindow
DestroyWindow
GetDlgItemInt
GetSubMenu
OffsetRect
SetScrollInfo
SetActiveWindow
LoadIconW
InvalidateRect
IsRectEmpty
GetClassLongW
GetActiveWindow
EmptyClipboard
CreateWindowExW
BeginDeferWindowPos
EnumWindows
GetDoubleClickTime
IntersectRect
GetWindowPlacement
TranslateAcceleratorW
GetSysColor
PtInRect
RemoveMenu
SetWindowLongW
DialogBoxParamW
SetWindowsHookExW
InsertMenuItemW
SetCapture
SetWindowPlacement
DefFrameProcW
GetMenuItemCount
SetScrollPos
LoadMenuW
DestroyAcceleratorTable
CopyRect
GetWindowTextW
BeginPaint
ScreenToClient
GetClassInfoExW
GetMenu
SetMenuItemInfoW
CallNextHookEx
GetKeyState
MessageBeep
GetWindow
TranslateMDISysAccel
DestroyCursor
MessageBoxW
GetWindowRect
GetCapture
SetCursor
DefWindowProcW
WindowFromPoint
RegisterClassExW
LoadCursorW
KillTimer
EnableMenuItem
MoveWindow
DispatchMessageW
UpdateWindow
LoadStringW
AppendMenuW
CloseClipboard
DestroyIcon
SetRectEmpty
GetParent
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 261KB - Virtual size: 261KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ