c:\ssb\dameo\hgbvsv\qeijtzfj\plee\scieoen.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c2947a35e3505fb609541cbeb0445b19_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c2947a35e3505fb609541cbeb0445b19_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c2947a35e3505fb609541cbeb0445b19_JaffaCakes118
-
Size
580KB
-
MD5
c2947a35e3505fb609541cbeb0445b19
-
SHA1
bda39b8c1c342856f937aaefd339f27fe6632d2f
-
SHA256
43987c3138aef12505c0ab82f19e7db075c64319240c76061833bdadd810593f
-
SHA512
b8785ccdf768027dd9eab6493e0273cab0bcb7a3de5f47dfc7786c92ad8891c3f5276f13db0de5877fecc2ec3121edba26cc8ee355fa0d3ecfc049098baf0224
-
SSDEEP
12288:hGj8jtSqcfb8DfgP+mkg6veJviUUVHuei+NZuhRh4ly+M7+:88jtKb8zgP+Rgp6UUVjFcDh45B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2947a35e3505fb609541cbeb0445b19_JaffaCakes118
Files
-
c2947a35e3505fb609541cbeb0445b19_JaffaCakes118.exe windows:4 windows x86 arch:x86
e297fc6cfa5f69040c48c7d85646392f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
GetDeviceCaps
EnumObjects
SetArcDirection
SetViewportOrgEx
SetSystemPaletteUse
EnableEUDC
GdiGetBatchLimit
CreatePolyPolygonRgn
CreateEnhMetaFileW
DeleteDC
GetTextCharsetInfo
GetColorAdjustment
DeleteObject
GetTextExtentPoint32W
RectVisible
GetBitmapBits
SelectObject
CreateDCW
SetBoundsRect
CreateFontW
CreateICW
GetEnhMetaFilePaletteEntries
SetMapperFlags
GetObjectW
PolylineTo
SetDIBColorTable
CreateDCA
CreateDiscardableBitmap
ModifyWorldTransform
shell32
DoEnvironmentSubstW
comctl32
ImageList_GetImageRect
ImageList_DragLeave
DrawStatusTextW
ImageList_SetIconSize
ImageList_SetDragCursorImage
ImageList_Read
ImageList_AddMasked
ImageList_GetFlags
ImageList_Destroy
ImageList_Merge
ImageList_DragShowNolock
ImageList_Draw
CreatePropertySheetPageW
ImageList_SetFlags
CreateUpDownControl
DrawInsert
ImageList_ReplaceIcon
CreateStatusWindowW
CreateMappedBitmap
ImageList_DrawIndirect
DestroyPropertySheetPage
ImageList_DragEnter
InitCommonControlsEx
ImageList_SetOverlayImage
CreateStatusWindow
kernel32
EnumSystemLocalesA
GetProfileStringA
GetUserDefaultLCID
MultiByteToWideChar
GetTimeFormatA
OpenSemaphoreW
OpenEventW
WaitCommEvent
DosDateTimeToFileTime
GetTickCount
CreateMutexA
GetSystemInfo
GetOEMCP
GetModuleHandleW
GetCPInfo
GetModuleFileNameA
GetStdHandle
SetPriorityClass
FreeEnvironmentStringsA
DeleteCriticalSection
GetCommandLineA
HeapDestroy
lstrcmp
GetStartupInfoA
GetDateFormatA
GetLocaleInfoW
GetCurrentProcessId
FillConsoleOutputAttribute
LCMapStringA
GetCurrentProcess
CreateDirectoryW
TlsAlloc
WriteFile
SetFilePointer
HeapFree
lstrcmpiW
GetTempPathA
SetEnvironmentVariableA
CreateNamedPipeW
TerminateThread
LocalAlloc
InterlockedIncrement
TlsGetValue
EnumDateFormatsW
VirtualQuery
AddAtomA
ReadFile
InterlockedCompareExchange
GetNamedPipeHandleStateW
EnumTimeFormatsA
SetThreadPriority
InitializeCriticalSection
GetTimeZoneInformation
WideCharToMultiByte
CreateMailslotW
GetStringTypeA
FlushFileBuffers
SetComputerNameA
CloseHandle
ConnectNamedPipe
GetEnvironmentVariableW
GetPrivateProfileSectionNamesW
VirtualFree
GetLocaleInfoA
GetProcAddress
CompareStringW
SetLastError
IsValidLocale
IsBadReadPtr
IsBadWritePtr
VirtualProtect
GetNumberFormatW
LeaveCriticalSection
GetVolumeInformationA
GetProfileSectionA
CreateSemaphoreW
GetSystemTimeAsFileTime
GetCurrentThread
HeapCreate
GetLastError
SetHandleCount
GetFileType
OpenSemaphoreA
GetVersionExA
SetEnvironmentVariableW
OpenMutexA
LoadLibraryA
SetStdHandle
HeapReAlloc
TlsFree
ExpandEnvironmentStringsA
ExitProcess
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetPrivateProfileStructW
GetEnvironmentStrings
VirtualAlloc
HeapSize
lstrcpy
LCMapStringW
CompareStringA
GetStringTypeW
UnhandledExceptionFilter
QueryPerformanceCounter
TerminateProcess
EnterCriticalSection
IsValidCodePage
TlsSetValue
GetACP
InterlockedExchange
HeapAlloc
SetConsoleCursorInfo
GetModuleHandleA
RtlUnwind
GetFileSize
InterlockedDecrement
GetCurrentThreadId
user32
ClipCursor
GetOpenClipboardWindow
DrawEdge
IsWindowUnicode
wvsprintfW
SetWindowPos
GetMenuContextHelpId
ShowWindow
SetRect
GetParent
GetDlgItemTextA
SetMenuItemInfoA
SetSystemCursor
UnloadKeyboardLayout
GetGuiResources
DlgDirListA
DdeQueryConvInfo
EnumWindowStationsW
RealChildWindowFromPoint
DdeSetUserHandle
GetWindowThreadProcessId
ChangeDisplaySettingsExW
CreateMDIWindowW
CreateDesktopA
CharToOemW
CharLowerA
CreateDialogIndirectParamA
UnhookWindowsHook
CopyAcceleratorTableA
OpenDesktopW
GetMenuItemID
SwapMouseButton
MapVirtualKeyW
CloseWindowStation
TileChildWindows
DefDlgProcW
GetCursorInfo
RegisterClassA
SetForegroundWindow
DdeImpersonateClient
CharPrevA
TabbedTextOutW
PaintDesktop
IsMenu
SetCursor
CopyAcceleratorTableW
DispatchMessageW
InvalidateRgn
SetParent
RegisterDeviceNotificationA
DestroyIcon
SetDoubleClickTime
CreateDialogIndirectParamW
GetKBCodePage
DlgDirSelectComboBoxExA
GetNextDlgTabItem
RegisterClassExA
GetFocus
ScrollDC
SetThreadDesktop
SetMenuInfo
OemKeyScan
InsertMenuItemW
ModifyMenuA
FlashWindow
CharUpperBuffA
SetPropW
advapi32
RegSetValueA
RegSetKeySecurity
RegReplaceKeyA
Sections
.text Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 244KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ