mstore.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ce9a5b2cac577042437f721e92c69eb8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce9a5b2cac577042437f721e92c69eb8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce9a5b2cac577042437f721e92c69eb8_JaffaCakes118
-
Size
190KB
-
MD5
ce9a5b2cac577042437f721e92c69eb8
-
SHA1
0fcac187287b5522b26c210d20c49451b293eb6b
-
SHA256
71d7ebc2a352fb85bd3386af2500dd62528765a166ab19bcac1d33e2a568a072
-
SHA512
33583c2624ac128e077aec7afd001898f950f7bbee08bb119ac3f49af0debedf2e84dc48f67d83023d320b2302f998a07d850ffa80bcabc140b76ad6bb4474ba
-
SSDEEP
3072:3sI7iqBwrKHFI5FyE68YQk76TsrqMumZqz1W9rVrwMFaLvbbwGB7yNkhTo7DcUbm:3sI7DAFyE67Q+02umZsUXWBB7yNkhcgd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce9a5b2cac577042437f721e92c69eb8_JaffaCakes118
Files
-
ce9a5b2cac577042437f721e92c69eb8_JaffaCakes118.exe windows:4 windows x86 arch:x86
8f1ee3afbd2b99fdb4331fcded6577d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_except_handler3
memset
_vsnwprintf
wcscmp
_controlfp
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
swscanf
_CxxThrowException
realloc
malloc
free
_wtoi
_wcsnicmp
wcslen
__CxxFrameHandler
_mbsrchr
wintrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WTHelperGetProvCertFromChain
WinVerifyTrust
crypt32
CryptHashPublicKeyInfo
kernel32
GetStartupInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
LocalAlloc
UnhandledExceptionFilter
TerminateProcess
FormatMessageA
LocalFree
GetSystemDirectoryW
LoadLibraryExW
SetUnhandledExceptionFilter
GetCommandLineW
VirtualAlloc
ExitProcess
GetTickCount
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetCurrentProcess
QueryPerformanceCounter
CloseHandle
WaitForSingleObject
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
SetEvent
CreateThread
CreateEventA
GetLastError
GetCurrentThreadId
AddAtomA
SetErrorMode
FreeLibrary
Sleep
InterlockedIncrement
lstrlenW
GetModuleHandleA
MultiByteToWideChar
lstrlenA
GetModuleFileNameA
WideCharToMultiByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
LoadLibraryA
user32
GetFocus
SetFocus
SetWindowLongA
GetWindowLongA
MessageBeep
DestroyWindow
GetClientRect
MoveWindow
DestroyIcon
GetSystemMetrics
GetAsyncKeyState
GetParent
SetCursor
GetClassNameA
EnableWindow
SystemParametersInfoA
KillTimer
PostQuitMessage
IsIconic
GetWindowRect
OffsetRect
GetWindowPlacement
SetWindowPos
DispatchMessageA
GetMessageA
GetCursorPos
EndPaint
FillRect
BeginPaint
IsWindow
GetActiveWindow
MessageBoxW
MessageBoxA
SetRect
CharNextA
LoadIconA
LoadCursorA
ShowWindow
UpdateWindow
LoadAcceleratorsA
PeekMessageA
WaitMessage
TranslateAcceleratorA
TranslateMessage
SetTimer
SendMessageA
GetMessageW
PostThreadMessageA
RegisterWindowMessageA
advapi32
RegQueryInfoKeyA
RegOpenKeyExW
RegQueryValueExW
RegSetValueExA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
ole32
OleGetClipboard
CoRegisterMessageFilter
OleUninitialize
OleFlushClipboard
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoRegisterClassObject
CoRevokeClassObject
OleSetClipboard
RegisterDragDrop
RevokeDragDrop
CoTaskMemRealloc
StringFromGUID2
oleaut32
SafeArrayDestroy
VariantClear
SysFreeString
SysAllocStringLen
SysAllocString
SysStringLen
VarUI4FromStr
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE