offcln.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cfe8f961b55466c6e71bb5652186352a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfe8f961b55466c6e71bb5652186352a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cfe8f961b55466c6e71bb5652186352a_JaffaCakes118
-
Size
131KB
-
MD5
cfe8f961b55466c6e71bb5652186352a
-
SHA1
52f5a4cf7f6dae6787e842f5430fdfe04d0bb24a
-
SHA256
53ea161089d1204c4857078f0e8c256bb23c6d8a196808c7db636e000b6709e6
-
SHA512
e1bb735873ea402213ce0fef6b50c2155c786f32cbf679045c1a6e2b258161ee645f1f3c70f3a9c5d2196f30b44e9fb32f5c818bcbeae1765584e47ac28e983d
-
SSDEEP
3072:+6s7MOMhflYCaYuuZIqK4nyvdp2APa4J1iCc:B9ZIqdnyvjPay1iCc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cfe8f961b55466c6e71bb5652186352a_JaffaCakes118
Files
-
cfe8f961b55466c6e71bb5652186352a_JaffaCakes118.exe windows:4 windows x86 arch:x86
f4635f03077e9f854bae23ec7e98e71e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
SetTextColor
DeleteDC
BitBlt
GetObjectA
SelectObject
CreateCompatibleDC
CreateSolidBrush
SetBkMode
GetTextExtentPointA
DeleteObject
CreateFontIndirectA
GetStockObject
EnumFontFamiliesExA
AbortDoc
EndDoc
EndPage
TextOutA
StartPage
StartDocA
SetAbortProc
GetDeviceCaps
GetTextMetricsA
ExtTextOutA
SetBkColor
kernel32
lstrlenW
GlobalAlloc
SizeofResource
LoadResource
FindResourceA
GetVersion
lstrlenA
MultiByteToWideChar
GlobalFree
lstrcmpiA
CloseHandle
WriteFile
CreateFileA
LocalFree
FormatMessageA
GetLastError
EnumResourceNamesA
GetVersionExA
SetCurrentDirectoryA
GetModuleFileNameA
GetTickCount
GetStartupInfoA
GetModuleHandleA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetFilePointer
EnumResourceLanguagesA
user32
ReleaseDC
GetDC
CharPrevA
DispatchMessageA
TranslateMessage
IsDialogMessageA
PeekMessageA
DialogBoxIndirectParamA
LoadBitmapA
MessageBoxA
IsDlgButtonChecked
DialogBoxParamA
CreateDialogParamA
CharNextA
GetWindowLongA
SetWindowLongA
LoadCursorA
EndDialog
SetCursor
LoadIconA
LoadImageA
DestroyWindow
GetParent
GetDesktopWindow
ClientToScreen
GetWindowRect
ScreenToClient
MoveWindow
GetWindowTextA
DrawTextA
BeginPaint
FillRect
EndPaint
CallWindowProcA
GetSysColor
LoadStringA
EnableWindow
SendMessageA
SetFocus
DrawFocusRect
RedrawWindow
SetDlgItemTextA
CheckRadioButton
ShowWindow
SendDlgItemMessageA
GetDlgItem
GetClientRect
msvcrt
_controlfp
memmove
isdigit
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_vsnprintf
comctl32
ord17
comdlg32
PrintDlgA
GetSaveFileNameA
oclean
InitDetection
HfOpenOpc
FCheckIfTargetIsRemove
AddFileSizeToSavingsVar
DoErrOOMDlg
FIsWord97ReallyWord98
MemCopy
SetMigrationLcid
FDoneWithPszFiles
FInitOPCDataFileBuf
GetFileBufRead
FDetectTargetStates
SetSourceDir
UintDetectAndMigrate
FDetermineCleanupActions
FSetTarget
FNoDarwinRemoval
FIsOtherListEmpty
FExecuteCleanupActions
FEarlyAppDetection
DoErrWriteDlg
OPCGetShellFolder
FreeAllBuffers
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE