d:\Projects\IeServices\YIeTagBm\YShortcut_EXE\Release\YShortcut.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cddc3108cea2d3096770e1244b9bed6a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cddc3108cea2d3096770e1244b9bed6a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cddc3108cea2d3096770e1244b9bed6a_JaffaCakes118
-
Size
288KB
-
MD5
cddc3108cea2d3096770e1244b9bed6a
-
SHA1
c0e136590a2cd53b1e0dc273d4d5c0d288924100
-
SHA256
88edcef18078fe7a13c94b674ec2910a2fdca9077379653115bb4ed79b5c7fec
-
SHA512
ca9ae02c91ce6b4f24b8d5053c0d2385283abd3afc7d7c3f2c127324fa27716a5937874bf5c8776d36f49eb6f02b7465460e3c479dd91150f3129680e796cadd
-
SSDEEP
3072:jqMICB1ju/tZ23cilpawilbDt7cJB/JCxt9Sr7jrwjZ8:jJa34cOjOPtOJJC79SHQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cddc3108cea2d3096770e1244b9bed6a_JaffaCakes118
Files
-
cddc3108cea2d3096770e1244b9bed6a_JaffaCakes118.exe windows:4 windows x86 arch:x86
0c6974c45e69153f5fc237c521ad9d8f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
kernel32
GetACP
MultiByteToWideChar
lstrlenW
InterlockedExchange
GetThreadLocale
GlobalAlloc
lstrcmpA
FlushInstructionCache
MulDiv
FindResourceA
LoadResource
DeleteCriticalSection
GetCurrentProcess
GetLastError
GetModuleFileNameA
InitializeCriticalSection
GlobalLock
GlobalUnlock
EnterCriticalSection
LeaveCriticalSection
LockResource
SizeofResource
FindResourceExA
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
SetLastError
GlobalFree
GlobalHandle
IsBadReadPtr
SetUnhandledExceptionFilter
RaiseException
FlushFileBuffers
VirtualQuery
VirtualProtect
SetStdHandle
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetFilePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
TerminateProcess
IsBadWritePtr
HeapCreate
GetCPInfo
GetOEMCP
ExitProcess
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcAddress
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
WideCharToMultiByte
GetLocaleInfoA
IsBadCodePtr
DeleteFileA
CreateDirectoryExA
CloseHandle
FindClose
FindFirstFileA
lstrcmpiA
lstrcatA
lstrcpyA
GetTempPathA
lstrlenA
GetVersionExA
GetSystemInfo
user32
UnregisterClassA
GetWindowLongA
CreateWindowExA
DestroyWindow
SendMessageA
PostMessageA
SetWindowTextA
MessageBoxA
ReleaseCapture
DefWindowProcA
CopyRect
GetActiveWindow
CallWindowProcA
EndDialog
DestroyIcon
MapDialogRect
DialogBoxIndirectParamA
SetWindowLongA
CreateAcceleratorTableA
GetDesktopWindow
FillRect
GetFocus
DestroyAcceleratorTable
GetSysColor
CharNextA
RegisterClassExA
LoadCursorA
wsprintfA
GetClassInfoExA
SystemParametersInfoA
GetClassNameA
IsWindow
SetWindowContextHelpId
GetDlgItem
GetParent
IsChild
GetWindow
SetFocus
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
UpdateWindow
ReleaseDC
GetDC
EndPaint
BeginPaint
MapWindowPoints
ScreenToClient
GetClientRect
GetWindowRect
SetWindowPos
GetWindowTextLengthA
GetWindowTextA
RegisterWindowMessageA
gdi32
SelectObject
DeleteObject
CreateSolidBrush
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
DeleteDC
GetStockObject
GetObjectA
GetDeviceCaps
advapi32
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoInitializeEx
OleUninitialize
OleInitialize
OleLockRunning
StringFromGUID2
CreateStreamOnHGlobal
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
oleaut32
LoadRegTypeLi
SysAllocStringLen
OleCreateFontIndirect
SysStringByteLen
VariantInit
VariantClear
SysFreeString
LoadTypeLi
SysStringLen
SysAllocString
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE