g:\ismeenet.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d1ee935f77e603ac491ae46132ec10e4_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d1ee935f77e603ac491ae46132ec10e4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d1ee935f77e603ac491ae46132ec10e4_JaffaCakes118
-
Size
512KB
-
MD5
d1ee935f77e603ac491ae46132ec10e4
-
SHA1
2cac2a73a01c7b85700a86586307ab33bc031df2
-
SHA256
4ed7018ee62b91c5f42a5e0e5f24e01fc16677bf61a59b0eb639728c3ac48068
-
SHA512
85bdc32a498d4721ecfd68569dfc937d74ff88dca9543e12d3580802463c71a3427c5a7f016efd851d7d18d62350de03e8f539d8d9b7ee25efdf1329dd3b18a3
-
SSDEEP
12288:89oBkF8xakidp108My/kVDMhfKFRblja:8mkF8xx8wyjJMRbNa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1ee935f77e603ac491ae46132ec10e4_JaffaCakes118
Files
-
d1ee935f77e603ac491ae46132ec10e4_JaffaCakes118.exe windows:4 windows x86 arch:x86
077370e8770e483427225b7235c20696
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
user32
GetCursorPos
DefDlgProcA
PostThreadMessageA
GetKeyNameTextW
RegisterClassA
IsZoomed
InsertMenuW
GetPropW
InternalGetWindowText
DrawTextExW
EndPaint
GetScrollInfo
KillTimer
EnumDisplaySettingsW
CreateWindowExA
RegisterClassExA
GetMessagePos
ShowWindow
GetTopWindow
MessageBoxA
shell32
DuplicateIcon
FindExecutableA
SHEmptyRecycleBinW
wininet
InternetGetCertByURLA
comdlg32
ChooseFontA
ChooseFontW
PageSetupDlgA
GetOpenFileNameW
kernel32
lstrcpyA
HeapFree
InterlockedIncrement
LoadLibraryA
GetStartupInfoA
LCMapStringA
RaiseException
FindNextChangeNotification
VirtualProtectEx
HeapAlloc
GetCurrentThreadId
WideCharToMultiByte
GetModuleFileNameA
CreateMutexA
HeapReAlloc
HeapDestroy
CompareStringA
GetCommandLineA
GetProcessHeap
TerminateProcess
GetStringTypeW
EnumResourceNamesA
OpenMutexA
ReadFile
SetEnvironmentVariableA
WriteConsoleOutputCharacterA
GetFileType
GetStdHandle
OpenFileMappingA
GetOEMCP
HeapCreate
EnumSystemLocalesA
GetTickCount
GetCPInfo
lstrcpynW
WriteFile
GetCurrentProcessId
GetConsoleCP
TlsFree
RtlUnwind
VirtualQuery
CloseHandle
SetUnhandledExceptionFilter
SetFilePointer
FreeLibrary
TlsSetValue
QueryPerformanceCounter
FreeEnvironmentStringsA
GetStringTypeA
LCMapStringW
VirtualAlloc
WriteConsoleA
MapViewOfFile
TlsGetValue
SetLastError
GetDateFormatA
VirtualAllocEx
Sleep
VirtualFree
IsValidCodePage
WaitNamedPipeA
InterlockedDecrement
SetLocalTime
GetSystemDirectoryW
GetModuleHandleA
LeaveCriticalSection
GetLocaleInfoA
InterlockedExchange
GetConsoleMode
LockFile
GetSystemTimeAsFileTime
TlsAlloc
EnterCriticalSection
CompareStringW
GetConsoleTitleW
GetUserDefaultLCID
GetLocaleInfoW
IsDebuggerPresent
SetHandleCount
AddAtomW
SetConsoleCtrlHandler
GetCurrentProcess
UnhandledExceptionFilter
GetVersionExA
GetCompressedFileSizeA
FlushFileBuffers
SetStdHandle
GetTimeZoneInformation
GetProcAddress
CreateFileA
LocalUnlock
GetEnvironmentStrings
GlobalAlloc
CreateRemoteThread
HeapSize
GetEnvironmentStringsW
IsValidLocale
OpenFileMappingW
GetFileAttributesA
GetACP
WriteConsoleW
FreeEnvironmentStringsW
GetNamedPipeHandleStateW
InitializeCriticalSection
GetLastError
MultiByteToWideChar
ExitProcess
DeleteCriticalSection
GetConsoleOutputCP
GetCurrentThread
GetTimeFormatA
Sections
.text Size: 332KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ