g:\xuwqfq\sxtfvpqak.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d1bb3c744e5299d06cecdc691613b2e1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1bb3c744e5299d06cecdc691613b2e1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d1bb3c744e5299d06cecdc691613b2e1_JaffaCakes118
-
Size
612KB
-
MD5
d1bb3c744e5299d06cecdc691613b2e1
-
SHA1
346feffa57de6b0c86142ffe810be7b8f81e0467
-
SHA256
398d5ad19f14ac1038337389bc7f506ccc2b144db971256e5fe16b6d98894a54
-
SHA512
956f7bf8c31d69752a166f61c0462960fc2dea1835d610125c9ca22ca67c747d388c12e9ec3b44726fba59cbf03ee9b923eec3f86037b8f9d29672aa35a45396
-
SSDEEP
12288:WP6I75+y54glM9mrg6LOG1DvYaCtJCIR3fCrwP9:WP6HuBnrg0foPR3arwP9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1bb3c744e5299d06cecdc691613b2e1_JaffaCakes118
Files
-
d1bb3c744e5299d06cecdc691613b2e1_JaffaCakes118.exe windows:4 windows x86 arch:x86
6cff2a36438a99ac9bd7d7fde3fe0a95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_LoadImageA
CreatePropertySheetPage
ImageList_LoadImageW
InitMUILanguage
CreateUpDownControl
ImageList_GetBkColor
InitCommonControlsEx
ImageList_DragShowNolock
ImageList_SetBkColor
ImageList_GetImageRect
kernel32
VirtualUnlock
IsValidCodePage
GetSystemTimeAsFileTime
GetConsoleTitleW
CommConfigDialogW
LockResource
EnumResourceLanguagesW
GetUserDefaultLCID
CreateProcessW
GetOEMCP
GetEnvironmentStringsW
ContinueDebugEvent
GetPrivateProfileStringA
ReadFile
GetCPInfo
GetACP
WriteProfileStringW
RtlUnwind
HeapCreate
GetDateFormatA
InitializeCriticalSectionAndSpinCount
ExitProcess
LCMapStringA
ReadConsoleOutputAttribute
GetStringTypeW
OpenEventA
MultiByteToWideChar
GetTimeZoneInformation
SetUnhandledExceptionFilter
GetLocalTime
GetDateFormatW
GetProfileStringA
ReadConsoleOutputW
TlsGetValue
CompareStringW
CreateMailslotA
QueryPerformanceCounter
HeapReAlloc
InterlockedDecrement
WideCharToMultiByte
lstrcmpiA
GetCurrentDirectoryW
GetAtomNameW
FileTimeToLocalFileTime
VirtualFree
FillConsoleOutputAttribute
EnumTimeFormatsW
WriteConsoleInputA
EnumTimeFormatsA
GetDriveTypeA
LeaveCriticalSection
GetTimeFormatA
GetCurrentProcessId
GetStartupInfoW
SetLastError
SetConsoleCtrlHandler
CreateMutexA
OpenMutexA
GetStdHandle
DebugActiveProcess
lstrcpyn
GetLocaleInfoA
MoveFileA
SetConsoleScreenBufferSize
SetConsoleWindowInfo
RtlZeroMemory
GetLastError
TlsFree
SetFileAttributesA
WaitForSingleObject
GetVersion
TlsSetValue
GetPriorityClass
GetModuleHandleW
InterlockedIncrement
WriteFile
GetCurrentProcess
OpenWaitableTimerA
GetCurrentThreadId
UnmapViewOfFile
GetDriveTypeW
GetConsoleCP
SetCurrentDirectoryW
FreeEnvironmentStringsW
GetFileAttributesExA
CreateFileA
lstrcatA
Sleep
GetStartupInfoA
SetStdHandle
SystemTimeToFileTime
HeapFree
TlsAlloc
EnterCriticalSection
GetModuleHandleA
WriteConsoleA
WriteConsoleW
GetCurrentThread
HeapSize
FlushFileBuffers
GetLocaleInfoW
EnumDateFormatsA
UnhandledExceptionFilter
GetPrivateProfileSectionW
GlobalHandle
GetFileType
GetFileAttributesExW
GetPrivateProfileIntW
CompareStringA
lstrcmpiW
GlobalFlags
SetLocaleInfoA
GetStringTypeA
FindFirstFileExW
TerminateProcess
IsDebuggerPresent
GetTickCount
WaitForDebugEvent
IsValidLocale
GetConsoleOutputCP
CreateDirectoryA
HeapDestroy
GetCommandLineA
GetSystemTime
CloseHandle
GetLogicalDriveStringsA
SetVolumeLabelA
GetModuleFileNameW
CreateWaitableTimerW
SetHandleCount
SetThreadIdealProcessor
LocalLock
GetProcAddress
HeapAlloc
GetModuleFileNameA
ReadConsoleW
GetConsoleMode
VirtualAlloc
LoadLibraryA
SetEnvironmentVariableA
LCMapStringW
EnumResourceNamesW
TryEnterCriticalSection
GetPrivateProfileStructW
VirtualQuery
FindResourceExA
SetFilePointer
InterlockedExchange
GetThreadContext
DeleteCriticalSection
EnumSystemLocalesA
GetPrivateProfileStructA
FreeLibrary
GetCommandLineW
GlobalAddAtomA
advapi32
CryptImportKey
DuplicateTokenEx
LookupPrivilegeDisplayNameA
CryptGenRandom
CryptGetDefaultProviderW
RegRestoreKeyW
CryptDestroyKey
InitiateSystemShutdownA
RegEnumKeyA
CryptSignHashW
gdi32
CreateICW
GetBitmapDimensionEx
EnumFontFamiliesExW
GetEnhMetaFilePaletteEntries
DeviceCapabilitiesExW
AddFontResourceA
SetBoundsRect
PaintRgn
GetCharWidth32W
DeleteObject
DeleteDC
OffsetWindowOrgEx
CreateCompatibleBitmap
UpdateColors
GetObjectA
SetWindowExtEx
AnimatePalette
GetTextCharacterExtra
CloseMetaFile
CreateMetaFileW
SetDeviceGammaRamp
GetDeviceCaps
CreatePatternBrush
GetRgnBox
PlgBlt
SetDIBits
CreateEnhMetaFileA
CreateDCW
user32
GetMessageA
MessageBoxW
EnumDisplayDevicesW
DestroyCaret
GetScrollPos
DlgDirSelectComboBoxExA
SwapMouseButton
SetCapture
ShowWindow
FlashWindowEx
DdeQueryStringA
InSendMessageEx
SetDlgItemTextA
SetDebugErrorLevel
GetPriorityClipboardFormat
SetScrollRange
DdeFreeStringHandle
GetListBoxInfo
CharLowerW
LoadCursorFromFileW
VkKeyScanW
SetWindowContextHelpId
CreateCaret
GetDoubleClickTime
GetClassInfoExA
EndPaint
SendIMEMessageExA
PackDDElParam
ModifyMenuA
ToAscii
OemToCharA
SetMenuDefaultItem
RegisterClassA
GetKeyNameTextA
BeginPaint
EnumPropsExA
CreateWindowExA
CharUpperBuffA
TabbedTextOutA
wsprintfW
DialogBoxParamA
SetWindowTextA
ShowScrollBar
DefWindowProcA
RegisterClassExA
MapVirtualKeyW
ScrollWindow
DdeUnaccessData
DdeQueryConvInfo
LoadAcceleratorsW
UnregisterHotKey
InsertMenuW
SystemParametersInfoA
GetDCEx
OpenClipboard
DrawIconEx
GetDlgItemInt
DdeDisconnectList
WINNLSEnableIME
CheckMenuRadioItem
BlockInput
LoadBitmapW
DestroyWindow
CreateAcceleratorTableA
LookupIconIdFromDirectoryEx
ReleaseCapture
GetMenuContextHelpId
GetMenuStringA
UnloadKeyboardLayout
EndDeferWindowPos
WindowFromPoint
GetUserObjectInformationA
CallMsgFilterW
DefWindowProcW
Sections
.text Size: 208KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 272KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ