c:\pzomveasqb\olekypp.PDB
Static task
static1
Behavioral task
behavioral1
Sample
d2b72f61690d66ac7dc68325de535aca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2b72f61690d66ac7dc68325de535aca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d2b72f61690d66ac7dc68325de535aca_JaffaCakes118
-
Size
296KB
-
MD5
d2b72f61690d66ac7dc68325de535aca
-
SHA1
4251bfc7eba87daa50e542db197cf7ca2fc23615
-
SHA256
6159396be63edcea0669dd8e074f08045682ec436e0f821e34c3f9afbf48766d
-
SHA512
6538a0a04808d4bf5a352fe6667872b43d6a6c307465303dbd286a976a306a1c5a00e7fdda0b8fc36ad4c3771058b43ba6d8388e74099151538ec46d85342e24
-
SSDEEP
6144:h0mC2yh2DO2rHpCWzPPC0EpwmcXtfcLus9OeeGRp+pIRPRTRpB:hdCrQi4HkWzy0EpwNtfcas00R9R9B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d2b72f61690d66ac7dc68325de535aca_JaffaCakes118
Files
-
d2b72f61690d66ac7dc68325de535aca_JaffaCakes118.exe windows:4 windows x86 arch:x86
5f3acd57e4cd11e83f62d207c755ce0a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Add
ImageList_SetBkColor
InitCommonControlsEx
CreatePropertySheetPageA
ImageList_GetImageInfo
wininet
SetUrlCacheEntryInfoW
InternetGetLastResponseInfoA
kernel32
GetEnvironmentStringsW
MultiByteToWideChar
GetLocalTime
GetCommandLineW
GetEnvironmentStrings
GetCommandLineA
GetLocaleInfoA
SetHandleCount
SetThreadAffinityMask
GetLastError
GetCurrentThread
DeleteCriticalSection
EnumSystemLocalesA
SetLastError
GlobalAddAtomA
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetCPInfo
GetACP
TlsGetValue
GetOEMCP
OpenMutexA
IsValidCodePage
FlushFileBuffers
GlobalGetAtomNameA
UnlockFileEx
LCMapStringA
GetTimeZoneInformation
FreeEnvironmentStringsA
SetConsoleTextAttribute
SetWaitableTimer
OpenWaitableTimerW
VirtualProtect
FlushConsoleInputBuffer
InterlockedExchangeAdd
lstrcat
EnumDateFormatsExW
GetFileType
IsBadWritePtr
EnterCriticalSection
HeapFree
HeapDestroy
UnhandledExceptionFilter
WaitCommEvent
HeapSize
HeapReAlloc
GetCurrentThreadId
TerminateProcess
CompareStringW
GetSystemDefaultLangID
IsValidLocale
GetDateFormatA
GetTimeFormatA
SetVolumeLabelA
LocalShrink
FindFirstFileA
VirtualFree
VirtualAlloc
WriteFile
CloseHandle
VirtualQuery
RtlUnwind
GetStdHandle
GetUserDefaultLCID
ReadFile
GetStringTypeW
SetEnvironmentVariableA
QueryPerformanceCounter
GetVersionExA
InitializeCriticalSection
GetPrivateProfileIntW
WideCharToMultiByte
GetModuleFileNameW
GetStartupInfoA
GetModuleFileNameA
EnumSystemCodePagesA
CreateMutexA
LeaveCriticalSection
TlsAlloc
RtlZeroMemory
TlsSetValue
LoadLibraryA
GetProcAddress
GetSystemInfo
HeapCreate
GetStartupInfoW
CompareStringA
GetModuleHandleA
SetFilePointer
GetLocaleInfoW
GetTickCount
ExitProcess
TlsFree
EnumDateFormatsA
GetCurrentProcess
GetLogicalDriveStringsW
GetCurrentProcessId
LCMapStringW
GetStringTypeA
SetStdHandle
InterlockedExchange
CreateDirectoryA
HeapAlloc
GlobalReAlloc
user32
SetWinEventHook
GetClipCursor
SetKeyboardState
CreateWindowExW
ToAscii
BringWindowToTop
CheckMenuItem
CreateDesktopA
RegisterClassA
GetNextDlgGroupItem
RegisterDeviceNotificationW
GetFocus
EnumDisplaySettingsA
TranslateAcceleratorA
DefWindowProcW
RegisterClassExA
GetCaretPos
DestroyWindow
MessageBoxW
MessageBoxExA
MenuItemFromPoint
ShowWindow
OpenWindowStationW
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ