X:\fzLaIwa\oulipdE\UwgZvi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cebf06b0f4bffd8bdc0c01bf317be71e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cebf06b0f4bffd8bdc0c01bf317be71e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cebf06b0f4bffd8bdc0c01bf317be71e_JaffaCakes118
-
Size
149KB
-
MD5
cebf06b0f4bffd8bdc0c01bf317be71e
-
SHA1
5d0aceb31a0569bf664dcde74ac054964fc4153b
-
SHA256
e8bf6831309cc6134ac988cc7f4df8108bb7d13c791879d930352c7109c5b257
-
SHA512
0412070b8c4ac93a8ea1b02bea739c660f4ff3750b609d3a67729e4147e77e5231150db0e7a9a20b5b0f82b8fd29f230093292cdc679f10b900e9578d176fc83
-
SSDEEP
3072:vzxviEdkER864kvr9xEUbIniezXpSl9YANmzc8wBVkcJsh3TZG+UT:lvNWERP4kvJbbCLpEYANmzgwOs+JT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cebf06b0f4bffd8bdc0c01bf317be71e_JaffaCakes118
Files
-
cebf06b0f4bffd8bdc0c01bf317be71e_JaffaCakes118.exe windows:5 windows x86 arch:x86
c6bfc4ce0dfbf8f78fa615b0e7482ec3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ole32
CoInitializeEx
CoUninitialize
gdi32
Ellipse
ResizePalette
CreateFontIndirectA
CreateCompatibleBitmap
SetTextColor
RestoreDC
CreateDIBSection
SetBkMode
PolyBezier
GetDIBColorTable
CreateRectRgn
TextOutW
user32
SwitchToThisWindow
IsWindowUnicode
GetKeyboardLayoutList
PostThreadMessageW
MapWindowPoints
GetMessageExtraInfo
CopyAcceleratorTableW
TrackPopupMenuEx
LoadStringA
GetTopWindow
DefDlgProcW
GetWindowDC
GetDlgItemTextA
GetKeyNameTextW
EnumThreadWindows
GetWindowLongW
AdjustWindowRectEx
GetWindowRect
SendMessageTimeoutW
GetMessagePos
DialogBoxIndirectParamW
LoadIconA
CreateAcceleratorTableW
IsCharAlphaNumericW
RedrawWindow
MapVirtualKeyW
LoadCursorA
UnionRect
SendInput
DefWindowProcA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetOpenFileNameW
ChooseColorW
comctl32
CreatePropertySheetPageA
ImageList_GetIcon
ImageList_Remove
ImageList_AddMasked
kernel32
GetStartupInfoW
FindNextFileA
EnumResourceLanguagesA
GetModuleHandleA
GetWindowsDirectoryW
GetFileAttributesExW
PulseEvent
VirtualFree
SetFileAttributesW
WaitForSingleObject
CreateSemaphoreA
IsBadCodePtr
CloseHandle
SetThreadPriority
Exports
Exports
?U__KDqkbp@@YGDD@Z
?f_d_c_yyqOzmdxuZBMkqst@@YGJD@Z
?_xoilYW__WN__UQ@@YGNF@Z
?hyfKBUU_mz_j_jz@@YGF_N@Z
?__ALPJZNQC_@@YGPAJJPAG@Z
?B__AKMFE@@YGKPAMF@Z
?Gki_GJCPY__TL@@YGPAGPAD@Z
?_DK_ffmqqwjOA@@YGPAGF@Z
?E_Xykrkji_wFJSHVU@@YGEPAGK@Z
?JQOULMEVBVO_km_@@YGHK@Z
?yIXVID_HNI_JNMJBRP_@@YGXG@Z
?jifsjv_@@YGPAIPANPAE@Z
?_Q_o_ry_dpeCKj@@YGJE@Z
Sections
.text Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ