U:\haGIzCeRanubra\wjVinWu\ciqYnmg\tDutoVanicBzu\lvZtHaItYulrio.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c81b6c6fb496f9e47bba8b88666ed6f1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c81b6c6fb496f9e47bba8b88666ed6f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c81b6c6fb496f9e47bba8b88666ed6f1_JaffaCakes118
-
Size
138KB
-
MD5
c81b6c6fb496f9e47bba8b88666ed6f1
-
SHA1
1ffae41f346e2cc83abcbd5a305a8adb1bd83646
-
SHA256
d415ff6022eb09077b8f9298cdd5bba74eccc46de097bd8289da0dd2c510d06c
-
SHA512
bdb129a20afb81815dbbdc107e33ad091e9c006ec627e20c076ddb23ac6f1d3ed8fa46869e32ff4a42c2d4b60d11a4a878e21e039bd193ddbb5d86bf39e8fcf5
-
SSDEEP
3072:F7kPSc96FondceD6HjT/vOsn3GK1NdJnz0yizL:lqdwodceD0j6s3GK1N5iz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c81b6c6fb496f9e47bba8b88666ed6f1_JaffaCakes118
Files
-
c81b6c6fb496f9e47bba8b88666ed6f1_JaffaCakes118.exe windows:5 windows x86 arch:x86
33ca0265badc3c86d6af92406fae48df
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
PropertySheetW
DestroyPropertySheetPage
ImageList_Write
kernel32
GetFileAttributesExA
GetTickCount
WriteFile
ConnectNamedPipe
SuspendThread
IsBadWritePtr
GetTempFileNameA
GetModuleFileNameA
EnterCriticalSection
GetVersionExW
GetModuleHandleA
LeaveCriticalSection
GetCurrentThreadId
ExitThread
WinExec
CreateEventW
shlwapi
StrTrimA
msvcrt
exit
gdi32
GetTextMetricsA
SaveDC
SelectObject
SetMapMode
CreateRoundRectRgn
SetBitmapBits
CreateBitmap
SetLayout
CreatePenIndirect
GetNearestColor
GetObjectA
SetPaletteEntries
StartDocW
user32
GetNextDlgGroupItem
BeginDeferWindowPos
EnumWindows
InsertMenuW
PostMessageA
GetKeyNameTextW
CharLowerW
SetDlgItemTextW
CharToOemW
wvsprintfA
GetWindow
IsWindowEnabled
EnumThreadWindows
GetDlgItemTextW
SetScrollInfo
LoadAcceleratorsW
GetWindowTextLengthW
AttachThreadInput
HideCaret
DestroyIcon
DeferWindowPos
SetRectEmpty
SetWindowTextA
ShowWindowAsync
IsZoomed
CreateDialogParamW
GetDlgCtrlID
AdjustWindowRect
FindWindowW
WaitMessage
comdlg32
PrintDlgExW
CommDlgExtendedError
GetSaveFileNameA
GetFileTitleW
Exports
Exports
?iDFQWOof_kgbfs__bd_ti@@UGDPAI@Z
Sections
.text Size: 115KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 102B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: 512B - Virtual size: 91B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp1 Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp2 Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tmp3 Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp4 Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tsc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ