W:\hOclQCeGahxtjP\ZkKopnM\apVVxgvRU\xlxdKNx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d285a31b90a2570f60e2ec05bd64d724_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d285a31b90a2570f60e2ec05bd64d724_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d285a31b90a2570f60e2ec05bd64d724_JaffaCakes118
-
Size
113KB
-
MD5
d285a31b90a2570f60e2ec05bd64d724
-
SHA1
ad7efee44ecaf85c2d9ae43aad26717e196fee8c
-
SHA256
8895b588b5a44e7a37145c5499bc328a9c99036060146bcff248c3c9df082484
-
SHA512
825ba51b22d4f79261bed18c80f824679e17dfe3a72fdf55bc344f7aceefa392240798f748d71ddefccdab3141af28dd3712fe7df1756114242400ae5cd69943
-
SSDEEP
3072:2K0IOBBGFRvLYskVvi4OSZau7+zmeljvgMeeS6:2PIscDLYtVvi4O1uOmOj4Meg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d285a31b90a2570f60e2ec05bd64d724_JaffaCakes118
Files
-
d285a31b90a2570f60e2ec05bd64d724_JaffaCakes118.exe windows:5 windows x86 arch:x86
31329a511ee750d717d937c49d551ba0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_AddMasked
ImageList_SetIconSize
ImageList_GetIconSize
ImageList_Draw
DestroyPropertySheetPage
msvcrt
putc
sscanf
strtol
atoi
_controlfp
iswprint
fwrite
fseek
setvbuf
strpbrk
wcstombs
strerror
swscanf
__set_app_type
localtime
__p__fmode
__p__commode
time
_amsg_exit
_initterm
isupper
wcscspn
printf
sprintf
_acmdln
floor
exit
toupper
gmtime
_ismbblead
_XcptFilter
wcsncpy
strstr
_exit
_cexit
isspace
__setusermatherr
wcscmp
__getmainargs
kernel32
GetNumberFormatA
GetFileSize
AreFileApisANSI
GetTickCount
lstrcpyW
GlobalGetAtomNameW
CompareStringA
CompareFileTime
EnumResourceTypesA
lstrlenW
GetCommTimeouts
CancelIo
HeapWalk
CreateWaitableTimerA
GetUserDefaultUILanguage
TransactNamedPipe
BuildCommDCBAndTimeoutsW
GetTimeFormatW
FormatMessageA
CopyFileA
ResetEvent
GetFileAttributesExW
SetFileTime
lstrcpynA
FindNextFileW
GetLocaleInfoW
GlobalFree
FindCloseChangeNotification
SetLocalTime
GetLongPathNameW
GlobalHandle
GetModuleFileNameA
HeapUnlock
GetModuleFileNameW
ConnectNamedPipe
SetFileAttributesW
HeapSize
GetComputerNameExA
GetHandleInformation
UnlockFile
GetBinaryTypeW
GetVersion
gdi32
CreateHalftonePalette
SetDIBitsToDevice
SetBrushOrgEx
SetMapMode
SetBkMode
GetTextExtentPoint32W
DeleteObject
GetObjectA
GetCharWidth32W
CreateBrushIndirect
StretchBlt
SetBkColor
PolyBezier
PtVisible
SetTextAlign
Ellipse
GetDIBits
SelectObject
GetPaletteEntries
GetTextMetricsA
WidenPath
GetTextExtentPoint32A
CreateSolidBrush
GetMapMode
ExtTextOutW
Escape
Polygon
CreateFontA
UnrealizeObject
CreateDIBSection
GetStockObject
GetTextMetricsW
RectInRegion
GetBitmapBits
EnumFontFamiliesExW
user32
ClipCursor
LoadCursorW
DrawFocusRect
RegisterClassExW
ArrangeIconicWindows
CharNextExA
ScreenToClient
ShowCursor
ShowScrollBar
CharToOemA
IsIconic
SwitchToThisWindow
DestroyMenu
GetDlgItem
CharUpperA
GetDC
WaitForInputIdle
MessageBoxW
GetPropW
OemToCharA
SetWindowLongW
SetMenu
ShowCaret
MessageBoxExA
GetDialogBaseUnits
CheckRadioButton
GetWindowTextLengthW
SetPropW
GetNextDlgTabItem
GetSystemMenu
SendMessageA
LoadBitmapW
GetSubMenu
DestroyWindow
SendMessageW
FindWindowW
LoadImageW
SetWindowPos
CascadeWindows
AllowSetForegroundWindow
ScrollWindow
CreateDialogIndirectParamW
PostThreadMessageA
IsWindowUnicode
DrawTextA
OffsetRect
GetMenuItemID
CheckDlgButton
GetKeyboardType
PostMessageW
LoadAcceleratorsW
IsWindow
CheckMenuRadioItem
WindowFromPoint
MapVirtualKeyW
AdjustWindowRectEx
ToUnicodeEx
GetClipCursor
SetScrollPos
DestroyCaret
SendMessageTimeoutW
ActivateKeyboardLayout
GetUpdateRgn
GetWindowLongA
RegisterWindowMessageA
SetActiveWindow
GetClientRect
CharUpperW
PeekMessageA
MoveWindow
CreateMenu
EnableMenuItem
GetActiveWindow
InSendMessage
GetClassInfoW
GetWindow
GetClassInfoExW
DrawAnimatedRects
UnionRect
DragObject
DefWindowProcA
DrawMenuBar
SendInput
IsRectEmpty
IsCharLowerA
GetScrollRange
CreateWindowExA
GetMessageTime
GetClassInfoExA
shlwapi
PathStripPathW
Exports
Exports
?SleepAhHJDud@@YGKEPA_WG@Z
?SleepUDSUDlkdlsds@@YGKEPA_WG@Z
?SleepUDudjkUD@@YGKEPA_WG@Z
?SleepYDyjDuUI@@YGKEPA_WG@Z
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 323B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ