U:\xwWkCJLk\zrtgbsc\KlpyNbCpFy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c7726e04332227df2bc709ec53fd26a0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c7726e04332227df2bc709ec53fd26a0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7726e04332227df2bc709ec53fd26a0_JaffaCakes118
-
Size
160KB
-
MD5
c7726e04332227df2bc709ec53fd26a0
-
SHA1
089e7aed655c694ec2748955a244f98de1f81619
-
SHA256
2fed24fd1c956f1c937ba53f732252e3ee4d95e247a47e8713b7249ac216d4fa
-
SHA512
e22daa66589bc0f2f362be5159c65fbd851432974a191a67654af25f7ff06e830accb0e6c98521a7a9a219514d6e1e484d16fa518bddbfc78c424a58a458c5e1
-
SSDEEP
3072:YBXduViVInM3+kG7eRcbd57ZJwDQ/M+tCeLzLPUMp1ibeWZN1J:YBXdSCInF7e6bd5C+tNv91ibeW/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7726e04332227df2bc709ec53fd26a0_JaffaCakes118
Files
-
c7726e04332227df2bc709ec53fd26a0_JaffaCakes118.exe windows:5 windows x86 arch:x86
69e9a152d35013cd23379c3d83415ecc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetSubMenu
MapWindowPoints
RedrawWindow
ScrollWindowEx
CreateAcceleratorTableW
DialogBoxParamW
CharPrevW
SendMessageTimeoutA
MessageBoxW
SetForegroundWindow
IsChild
ValidateRect
SetClassLongW
GetDoubleClickTime
SetRectEmpty
TrackPopupMenuEx
LoadStringA
mouse_event
CascadeWindows
ChangeMenuW
LookupIconIdFromDirectory
DragObject
GetShellWindow
GetPropW
EqualRect
EndDialog
CreateDialogIndirectParamW
GetKeyboardLayoutNameW
DrawIconEx
comctl32
ImageList_Draw
ImageList_Read
CreateStatusWindowW
kernel32
GlobalAlloc
QueryPerformanceCounter
GetComputerNameExW
HeapValidate
GetCommState
GetFileAttributesExA
CancelIo
WaitForSingleObject
CreateEventA
FindResourceA
lstrcpyA
lstrlenW
lstrcmpiW
FindResourceExA
CompareStringW
SleepEx
GetCommConfig
gdi32
GetTextAlign
CreateFontIndirectW
SetStretchBltMode
CreatePenIndirect
GetTextColor
SetBkColor
GetPixel
GetCharWidth32W
SetWindowExtEx
GetTextExtentPoint32A
Escape
EndPath
CreateDIBSection
msvcrt
exit
shlwapi
UrlGetPartW
PathMatchSpecA
ntdll
strcspn
memset
Exports
Exports
?B__KDVMbtc_NWM@@YGPAGPAI@Z
?__b_uYI_JJR_LIQTP@@YGHPAGI@Z
?J_Q_HBMgl@@YGXF@Z
?mi_jol_c_d_a_c@@YGXJ@Z
?RC_Z_sshih_xlXY_V@@YGPAXMPAH@Z
?P_VE_D_xysh_fprs@@YGME@Z
?__IKJAPH_LGO@@YGXK@Z
?CTUBLUE__B@@YGFPAE@Z
?PH_X_J__y_c@@YGNJ@Z
?URHWnkL_eHQxc@@YGHD@Z
?_AFRUifqmISF@@YGDD@Z
?EVMToY_Dwo_SEU_DUi@@YGKH@Z
?_goku_mgw_saN@@YGEEPAJ@Z
?jsqqg_UBen__JWQ_FAV@@YGGF@Z
?_bv__eAQT_GWvo@@YGDJ@Z
?LZKFw__ch_sxka_tk@@YGPAIPAJ@Z
?ogqpaDsp_y_raxc@@YGFJ@Z
?N_cyS__MDLa_ruyugkG@@YGXF@Z
?_sll__ioMU_SKZ_KN@@YGPAMDK@Z
?KX_BDW__zv@@YGPAHE@Z
?S_Ei_g_jeligvwbeLXA@@YGPADJ@Z
?roh__qzgpql_m__N__@@YGPAXHD@Z
?__giDRNE@@YGPAXPAD@Z
?ZUVVKUQ_CG_v_ouf_@@YG_NPA_N@Z
?___iqirkpGJ_vcjYP__@@YGXI@Z
?egu_d_oKrmZQLL@@YGXN@Z
?Cnp__hJ_SOmu@@YGIDPAN@Z
?FN_JP_UPo@@YGFIPAG@Z
?Q_Pf_jg_WQFWCXtmh@@YGEF_N@Z
?_lt_miyexo_v_r_vc_d@@YGPAGEPAI@Z
?st_c_tEELRTNq_k_c@@YGPA_NK@Z
?ksU_JODQIE@@YG_NN@Z
?_OOKBQWWkv_jmO_@@YGKN@Z
?_DMDH_KR@@YGPAFMPAN@Z
?MKUAK_dsz_oD_PB_ulp@@YGPAEH@Z
?ddcy_kPIXVEqEFMYINyw@@YGXJ@Z
?XC_BTLNL_F_FcqOXNR__Zx@@YGHPAF@Z
?r_wv_fc_bt@@YGMMD@Z
?IHWUZLSYf@@YGPAFJ@Z
?JDAIXH_TP_GBT_e__M@@YGKPAGPAK@Z
?vo_j_WBV_@@YGJPAGN@Z
?kiiNTYLWxwmnkozfgvkh@@YGPAFPAIPA_N@Z
?_w_IU__@@YGPAHN@Z
?uf_vg_qwcYCMHRJICIjrTQ@@YGPAGHPAF@Z
?joob_yjWDQ@@YGKIH@Z
?g_taa_oiAN_JNZcsuGI_@@YGIPA_ND@Z
?OHOIJIB__Essxj@@YGXPAF@Z
?yr_huk_XX_Vx_owJIT_@@YGJPADE@Z
?ZNUHMEDx_cGIO_QGMAX@@YGJN@Z
?NIxervswgkznDCXNZ@@YGKPAE@Z
?ERbTONIc@@YGGHH@Z
?PV_LID_DAi_NI@@YGHH_N@Z
?jfxUHASN@@YGPAXPAGI@Z
?us_l_SDD@@YGJPAK@Z
?M_AXRT_S__M@@YGPAIDI@Z
?rswwFSxmrnz_F_FJ@@YGPAJKF@Z
?_z__oqcdln_ipxldvs@@YGNGPAM@Z
?xu_aeq___L@@YGXPAIE@Z
?hvwwzIPm@@YGXHD@Z
?bty_aSEKAZK@@YGXPAIPAM@Z
?_Oa__hynep@@YGJ_NM@Z
?_ATHXQwf_@@YGHPAI@Z
?H_CFKUz_gwoBWpf@@YGDHE@Z
?T_PCMFJ_nk__oz@@YGX_NJ@Z
?dc_XnmrFOIDNnj@@YGPAIPAH@Z
?_PQKA_HJftk@@YGPAXIN@Z
?HJAlcutf_ajIYn_haqE@@YGPAGEPAI@Z
?lbl_xsfCJFPB_GDnS@@YGPANGJ@Z
?IO_DK_GK__SC__DIATK_m@@YGXPAMI@Z
?PTEYGloFYOHA_i_ytfz@@YGPAXKPAM@Z
?Ltgn_eit@@YGMGPA_N@Z
?g__boD_A@@YGMPAN_N@Z
?_EN_Ordi__xaQR@@YGPAEPAKI@Z
?ZOCp_x_oHY_FJZwa@@YGPAXPAM@Z
?_oPRRXJ@@YGJPAM@Z
?fUVqvnj_atQJlzE_dsna__@@YGFKF@Z
?WMISKMPq_ub_NX@@YGKH@Z
?bkwFK_DPBRN__DPGYJ_R@@YGXNM@Z
?eueKJDomtz_b_olwnWTY@@YGFPAKG@Z
?SNVJTT_WK_A_W@@YGGKG@Z
?u_u_j__mrqj@@YGGPAMI@Z
?AG_G_xe_mC_X_Z@@YGDPAD@Z
?AVRFXEonkrfzxpr@@YGDK_N@Z
?K_DH_MU___FBN_Wrifybgp@@YGXPAE@Z
?_gy_ik_qhqyv_qob@@YGPAEPAKF@Z
?_Pemdcm_uCLC@@YGXPAFG@Z
?L__QXEP_ZMVIbxHZV_M_H@@YGPAJE@Z
?bcfnqgws_E_T__xoicVI@@YGPAEPAN@Z
?lXCj___aM_N@@YGPAKN@Z
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ldata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 37KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 511B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ