d:\depot\bas\710_REL\bw_350_REL\opt\ntintel\wdbbapp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c2642a3014f13004779349b00d37eb33_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c2642a3014f13004779349b00d37eb33_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c2642a3014f13004779349b00d37eb33_JaffaCakes118
-
Size
136KB
-
MD5
c2642a3014f13004779349b00d37eb33
-
SHA1
3ca53d4272567ca4b05d15d8478df18d7892874a
-
SHA256
19d391ee462958d1102fbac10f5d650fbd12cf6a6bc64fae9cce397523781b8a
-
SHA512
773ba2869c363ed993588572e3a5ab9ef52fed687eb0095028de85fe0e9ac462066da8c137d35daaef7d1872b1f0b7e4332e541d81e98e6a57441cef4aca2740
-
SSDEEP
3072:MsiOKwvafEo/CYYkXFMvvjFUFFUJLOlDZKhcrWxKGQi1PI:MOKj/CvO7KuWfS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2642a3014f13004779349b00d37eb33_JaffaCakes118
Files
-
c2642a3014f13004779349b00d37eb33_JaffaCakes118.exe windows:4 windows x86 arch:x86
9d9bfc515ed66633b5e2501b031b9dbe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
mfc80
ord5230
ord4568
ord3948
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord2248
ord4189
ord5213
ord1185
ord1084
ord3161
ord2368
ord3286
ord1279
ord5637
ord1063
ord757
ord1968
ord2750
ord2746
ord5644
ord266
ord265
ord907
ord602
ord347
ord3683
ord1054
ord1126
ord1929
ord3115
ord5945
ord3605
ord1614
ord3466
ord572
ord4486
ord2991
ord2862
ord5200
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord5566
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1402
ord3946
ord1617
ord1620
ord5915
ord6725
ord760
ord4265
ord4799
ord3287
ord3163
ord2372
ord1903
ord1308
ord2176
ord742
ord635
ord553
ord395
ord1599
ord4277
ord1306
ord2173
ord5205
ord5148
ord3945
ord1557
ord1207
ord2424
ord2425
ord2992
ord5356
ord943
ord4904
ord2939
ord4135
ord4309
ord5012
ord5009
ord2615
ord1913
ord2246
ord5859
ord4299
ord5165
ord5833
ord6067
ord5929
ord6090
ord6065
ord6282
ord4250
ord4762
ord5731
ord6035
ord5641
ord5640
ord502
ord326
ord4927
ord4001
ord4123
ord2264
ord3761
ord709
ord2527
ord501
ord3648
ord1187
ord1191
ord3596
ord3118
ord5946
ord3908
ord3907
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord2272
ord3934
ord6288
ord384
ord5563
ord1486
ord911
ord297
ord5089
ord1439
ord5529
ord629
ord313
ord1280
ord3204
ord1934
ord2322
ord1123
ord3210
ord1091
ord5493
ord2703
ord2702
ord3201
ord380
ord310
ord762
ord1198
ord6118
ord6703
ord299
ord1489
ord304
ord5490
ord5491
ord2902
ord2451
ord3997
ord781
ord578
ord2468
ord5403
ord784
ord876
ord785
ord764
ord928
ord4019
msvcr80
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
_decode_pointer
_onexit
_lock
_encode_pointer
_setmbcp
memset
sprintf
sscanf
__CxxFrameHandler3
_ctime64
_localtime64
_time64
memcpy
vsprintf
exit
atoi
malloc
free
wcscpy_s
__dllonexit
calloc
_recalloc
_resetstkoflw
wcslen
?terminate@@YAXXZ
_unlock
kernel32
GetVersion
lstrlenW
CompareStringA
CompareStringW
lstrcmpiA
lstrcmpiW
lstrlenA
GetEnvironmentVariableW
GetStringTypeExA
GetStringTypeExW
SetEnvironmentVariableA
WideCharToMultiByte
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcpyA
lstrcpynA
GetEnvironmentVariableA
GetUserDefaultLCID
GetACP
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
GetProcAddress
FreeLibrary
LoadLibraryA
SetErrorMode
GetModuleFileNameA
Sleep
GetStartupInfoA
GetSystemDirectoryA
GetVersionExA
GetLocaleInfoA
GetThreadLocale
InterlockedCompareExchange
MultiByteToWideChar
InterlockedExchange
user32
CharUpperA
CharUpperW
RegisterWindowMessageA
GetCursorPos
ReleaseCapture
IsWindow
GetClassInfoExA
RegisterClassExA
LoadImageA
EnableWindow
GetActiveWindow
CharLowerW
UpdateWindow
ScreenToClient
GetClientRect
GetWindowRect
IsZoomed
OffsetRect
SetRect
PtInRect
LoadIconA
SendMessageA
wsprintfA
GetSystemMetrics
SystemParametersInfoA
InvalidateRect
CharLowerA
MessageBoxA
SetCapture
gdi32
Rectangle
CreateCompatibleBitmap
SetDIBColorTable
CreateDIBSection
GetDIBits
SetDIBits
BitBlt
RealizePalette
GetDeviceCaps
CreateCompatibleDC
CreatePalette
GetObjectA
GetPaletteEntries
CreateFontA
CreateFontIndirectA
SetPixel
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
shell32
ShellExecuteA
oleaut32
SysFreeString
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE