C:\ewldehbmtgquP\MvnxYtFfw\raNsEizimirf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ce8ebc1f092b8b117a99f7fe56f56005_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce8ebc1f092b8b117a99f7fe56f56005_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce8ebc1f092b8b117a99f7fe56f56005_JaffaCakes118
-
Size
219KB
-
MD5
ce8ebc1f092b8b117a99f7fe56f56005
-
SHA1
9b9c0fb718ccc74692cbdf2e189a024d64119f1d
-
SHA256
3d30e31f08e1d936c41c3a365c2d19d4b8f1b893437bd64c702533c9b8b4dab0
-
SHA512
2f5b1cd36de9ae207503d0ba712f7574c4cffc68dc52909cd49530ac21ac59df5f0eb3fd82be2f221eafa850f612afe6fff537c7892d2683fbcc4884631d7a23
-
SSDEEP
6144:8sUUZKh/GZZGqZevx+c5wTmWe1sDvW/Nc0:8sUUK4C+cyTmocNc0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce8ebc1f092b8b117a99f7fe56f56005_JaffaCakes118
Files
-
ce8ebc1f092b8b117a99f7fe56f56005_JaffaCakes118.exe windows:5 windows x86 arch:x86
a2517d4f6283f58579ad7f3a5164cd4c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
EnumChildWindows
CallWindowProcW
GetClassInfoExW
IsWindowVisible
CloseDesktop
TileWindows
SetWindowTextA
EndPaint
GrayStringW
ClientToScreen
ExitWindowsEx
GetScrollPos
CheckMenuRadioItem
MapWindowPoints
GetMenuCheckMarkDimensions
GetDlgItem
GetDialogBaseUnits
ShowWindow
GetWindowDC
CharLowerA
IsWindowUnicode
PostQuitMessage
IsZoomed
ValidateRect
GetAltTabInfoW
GetCursorPos
GetNextDlgTabItem
LoadStringA
CallWindowProcA
AttachThreadInput
IsCharAlphaW
GetClassNameW
CharNextExA
IsRectEmpty
CreateWindowExA
SetWindowPos
ole32
OleIsRunning
gdi32
Rectangle
GetTextExtentPointW
CreateBitmapIndirect
CreateFontIndirectW
SetWindowExtEx
CreateHalftonePalette
SaveDC
PtInRegion
CreatePen
Ellipse
EnumFontFamiliesW
ExtTextOutA
PatBlt
SetBitmapBits
PolyBezier
CreateFontW
msvcrt
memcpy
version
VerQueryValueW
kernel32
FormatMessageA
HeapReAlloc
IsValidLocale
TryEnterCriticalSection
GetStartupInfoW
TlsSetValue
GetCompressedFileSizeW
GetSystemWindowsDirectoryA
GetLongPathNameW
GetACP
GetComputerNameExW
HeapAlloc
LoadResource
ClearCommError
GlobalReAlloc
GlobalMemoryStatusEx
ResumeThread
Exports
Exports
?SDOisioKJS@@YGKEPA_WG@Z
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dat_0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dat_2 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_3 Size: 1024B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_4 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ