L:\jpImDUZj\eqmfivnvYEl\vulevEwrevrnl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d33250212899cb6b21c4e1bbafcab841_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d33250212899cb6b21c4e1bbafcab841_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d33250212899cb6b21c4e1bbafcab841_JaffaCakes118
-
Size
42KB
-
MD5
d33250212899cb6b21c4e1bbafcab841
-
SHA1
ae197b6a5aa6b1b9a887348f067d178384bc151b
-
SHA256
9ac0496e3d17848f5f966a63671a051a8ae01678fcbdb42df93fbfcf7d6f2910
-
SHA512
a922d8c9a324a1d8a84e3bed0a5157f78c009812cb65516571e955c8f1e9625631e5843181d96593d4da65f94120492ab3bbe27e0a5a35a2b22a877f86296930
-
SSDEEP
768:T2eAk+Boqi5dzKvUVmdtN2RBovhmTuDtJrRtIV+9XwLO8i/iN4fJ:sBhi5dzK3ZhmyDfVwS8+vR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d33250212899cb6b21c4e1bbafcab841_JaffaCakes118
Files
-
d33250212899cb6b21c4e1bbafcab841_JaffaCakes118.exe windows:5 windows x86 arch:x86
7650d6e0ffc9d51a36857db056f18a75
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
wcstok
qsort
isxdigit
wcscoll
free
_controlfp
fread
fflush
system
fgetc
iswprint
time
__set_app_type
__p__fmode
bsearch
mbtowc
atol
strtok
wcsncmp
__p__commode
_amsg_exit
puts
mbstowcs
fwrite
wcsrchr
mktime
fprintf
wcsncpy
iswdigit
_initterm
strpbrk
fseek
_ismbblead
isalnum
_XcptFilter
gmtime
wcscpy
towupper
_exit
strcpy
strcspn
strncpy
strerror
perror
_cexit
__setusermatherr
__getmainargs
user32
wsprintfW
CreateDialogParamW
GetClassInfoExW
DrawEdge
CharNextA
SetWindowLongW
ArrangeIconicWindows
PostThreadMessageW
OpenInputDesktop
FillRect
DispatchMessageW
FindWindowW
GetPropW
ShowOwnedPopups
DialogBoxIndirectParamA
IsMenu
GetKeyboardType
GetMenuItemInfoW
MapVirtualKeyA
CallWindowProcW
CharLowerW
CreateWindowExA
BringWindowToTop
GetMenu
WaitMessage
IsCharAlphaW
OemToCharBuffA
ScrollWindowEx
GetDlgItem
DefWindowProcA
SendMessageW
IsDlgButtonChecked
DrawStateA
FrameRect
LoadImageA
GetNextDlgGroupItem
CheckRadioButton
GetWindowTextW
SendInput
CreateMenu
InSendMessageEx
EqualRect
IsCharAlphaA
GetDlgItemTextA
DrawStateW
MessageBoxExA
GetClassInfoW
ClipCursor
GetFocus
GetClassNameW
CharUpperBuffA
AppendMenuW
CreateDialogIndirectParamW
PostMessageW
OemToCharA
DestroyWindow
SetCursorPos
GetLastActivePopup
GetActiveWindow
MessageBoxA
ModifyMenuW
GetMenuCheckMarkDimensions
PeekMessageA
VkKeyScanW
GetClientRect
DestroyCaret
DeferWindowPos
DestroyAcceleratorTable
EnableWindow
SetFocus
GetTopWindow
GetMessageW
EnableScrollBar
AdjustWindowRect
InSendMessage
CharNextExA
HiliteMenuItem
GetMenuItemCount
CharUpperBuffW
GetScrollInfo
CharToOemW
CreateIconIndirect
SetScrollPos
SetScrollRange
IsWindowVisible
GetWindowPlacement
TrackPopupMenuEx
IsDialogMessageW
LoadImageW
ToUnicodeEx
LoadIconA
EnableMenuItem
GetWindowLongA
ClientToScreen
RegisterHotKey
SendDlgItemMessageA
OffsetRect
BeginPaint
CreateCursor
MonitorFromRect
DrawAnimatedRects
GetUpdateRect
wsprintfA
SendMessageA
GetParent
SetMenuItemInfoW
DialogBoxIndirectParamW
AttachThreadInput
PostQuitMessage
RegisterClassW
CharPrevA
GetMessageExtraInfo
GetSysColor
ValidateRect
GetMenuItemID
IsZoomed
DestroyCursor
SetRectEmpty
GetDCEx
DrawIconEx
LoadAcceleratorsW
GetDialogBaseUnits
InternalGetWindowText
SetWindowTextW
comdlg32
GetSaveFileNameA
PrintDlgExW
GetSaveFileNameW
PageSetupDlgW
kernel32
GetDateFormatA
GetCurrentDirectoryW
GlobalReAlloc
DeleteCriticalSection
GetCurrentThread
CreateWaitableTimerA
lstrlenW
GetModuleFileNameA
GetSystemTimeAsFileTime
CreateDirectoryW
GetSystemDirectoryW
SetLastError
ReleaseMutex
GetVersionExA
GetComputerNameExW
WaitForMultipleObjectsEx
SetErrorMode
GlobalAddAtomW
SetEvent
EnumResourceTypesA
GetFileTime
VirtualAlloc
GetTempPathW
GetCurrentThreadId
TlsFree
SearchPathW
UnlockFile
GetBinaryTypeA
SetSystemTimeAdjustment
EnumSystemLocalesA
SetFileTime
OpenFile
IsBadReadPtr
SetFileAttributesA
lstrcpynW
GetSystemDirectoryA
GetTempPathA
VirtualFree
EnterCriticalSection
CancelWaitableTimer
DisconnectNamedPipe
GetSystemDefaultLangID
SetCurrentDirectoryA
QueryPerformanceCounter
CreateSemaphoreA
GetSystemWindowsDirectoryW
SetThreadPriority
GetModuleHandleA
CompareStringW
IsValidLanguageGroup
EscapeCommFunction
MoveFileW
MoveFileA
CreateWaitableTimerW
GlobalAlloc
SetThreadContext
lstrcmpA
WaitForMultipleObjects
GetTickCount
Exports
Exports
?RegenerateMainValues@@YGKPBDDPAX:O
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.e_tab Size: 512B - Virtual size: 125B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.redit Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.i_tab Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.site Size: 512B - Virtual size: 304B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wdata Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ