e:\aaobvsga\ogeg\reszdjios\wosuepmvg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d0f98074349375faddb9bc8cf64322f2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0f98074349375faddb9bc8cf64322f2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0f98074349375faddb9bc8cf64322f2_JaffaCakes118
-
Size
320KB
-
MD5
d0f98074349375faddb9bc8cf64322f2
-
SHA1
1d3c92c39a59a4dc6e794868f44c2ccf0ed66f2e
-
SHA256
ca53fea42cf504c270c4d1c7a6d941f2a30c2882884dc6a175c1068d7c97485e
-
SHA512
7086ed2b6cb12ef5faa9c96f3ced5066ff115299f98694fcf711c0fab46162349a82d63c7f3034a28640a7844f9ddfbb3d1e9856a31e0d4b8083d6a6d4ca05be
-
SSDEEP
6144:XP2ulBCB22YJunj+YzXqpP/whNAIcPQQtVc+HdPhYZKQTNPa:fplBCB/pj+YzapP/wnAIcPQQtVzHdIPa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0f98074349375faddb9bc8cf64322f2_JaffaCakes118
Files
-
d0f98074349375faddb9bc8cf64322f2_JaffaCakes118.exe windows:4 windows x86 arch:x86
7cb9d8aab12fb90d05a1487e98ff03e3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetSaveFileNameA
ChooseFontA
FindTextA
GetFileTitleA
user32
SetDeskWallpaper
DrawCaption
GetKeyboardLayoutNameW
SetRect
GetComboBoxInfo
ScrollDC
CopyIcon
GetUserObjectInformationW
GetWindowThreadProcessId
TrackPopupMenu
GetClipboardData
CreateMDIWindowW
RegisterClipboardFormatA
GetClassNameA
GetMessageExtraInfo
SetPropA
GetCapture
DdeQueryStringA
CharToOemW
MsgWaitForMultipleObjectsEx
OemToCharBuffA
SetProcessDefaultLayout
SetScrollRange
DdeDisconnectList
MapDialogRect
SwitchDesktop
TrackPopupMenuEx
GetTabbedTextExtentA
GetInputState
SetParent
ShowScrollBar
RegisterClassExA
SetClipboardData
RegisterClassA
CharUpperA
EnableScrollBar
WaitForInputIdle
GetClassInfoW
GetClassWord
DefWindowProcW
RealGetWindowClass
EnumDesktopsA
comctl32
DrawInsert
ImageList_Add
ImageList_GetFlags
ImageList_Copy
ImageList_Replace
ImageList_AddMasked
DrawStatusText
ImageList_Destroy
ImageList_Merge
ImageList_Draw
ImageList_DrawEx
ImageList_SetFilter
InitCommonControlsEx
ImageList_BeginDrag
InitMUILanguage
ImageList_ReplaceIcon
kernel32
OpenEventW
GetACP
QueryPerformanceCounter
ReadFile
GetProcAddress
GetCurrentProcessId
VirtualFree
RtlUnwind
GetCPInfo
GetStartupInfoA
SetEnvironmentVariableA
GetLocaleInfoW
GetLocaleInfoA
EnterCriticalSection
MapViewOfFileEx
HeapDestroy
IsBadWritePtr
GetSystemInfo
EnumResourceLanguagesW
LCMapStringA
HeapSize
ExitProcess
GetFileType
LoadLibraryA
FlushFileBuffers
GetTimeZoneInformation
SetUnhandledExceptionFilter
GetModuleHandleA
CompareStringA
TlsSetValue
GetDriveTypeW
IsValidCodePage
TlsGetValue
GetStringTypeW
GetLastError
GetCurrentThread
WideCharToMultiByte
FreeEnvironmentStringsA
HeapFree
CloseHandle
LeaveCriticalSection
UnhandledExceptionFilter
HeapAlloc
SetHandleCount
CompareStringW
TerminateProcess
TlsFree
SetFilePointer
WriteFile
VirtualQuery
GetCommandLineA
InterlockedExchange
InitializeCriticalSection
OpenMutexA
HeapCreate
GetOEMCP
MultiByteToWideChar
GetDateFormatA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetUserDefaultLCID
GetTickCount
LCMapStringW
GetCurrentProcess
IsValidLocale
GetCurrentThreadId
SetStdHandle
GetVersionExA
HeapReAlloc
SetLastError
GetEnvironmentStringsW
GetTimeFormatA
DeleteCriticalSection
VirtualProtect
EnumSystemLocalesA
TlsAlloc
GetModuleFileNameA
VirtualAlloc
GetStdHandle
GlobalAddAtomW
CreateMutexA
GetSystemTimeAsFileTime
GetStringTypeA
Sections
.text Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ