D:\OANRODAQDA\YRJBKZE\TUFBYL\RUTSQJ\CZHOGSZA.PDB
Static task
static1
Behavioral task
behavioral1
Sample
d33da663824887f409d71ffe007eba28_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d33da663824887f409d71ffe007eba28_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d33da663824887f409d71ffe007eba28_JaffaCakes118
-
Size
302KB
-
MD5
d33da663824887f409d71ffe007eba28
-
SHA1
09d4eab8c07775608a368402c0d0f447c24fc197
-
SHA256
1dfd621010670eace26ec1d9c24eeced8118fda832910062babdbbc22ebb13c0
-
SHA512
e22aa72b8e39ec0ef85be6fa5ff425266b46e1cf99dd0a31a0491a022dde388f1025f97072400eafd2b7c50aa83fd521d06aee22b3698aca893a3f97efd5ea6b
-
SSDEEP
6144:5jFVKT70nXfGQYUYMeyGDoZ8iOTyCbKN5wXhgY9Wx:tFVKH0nXfGrUYAGDoZnEyCbKwyYi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d33da663824887f409d71ffe007eba28_JaffaCakes118
Files
-
d33da663824887f409d71ffe007eba28_JaffaCakes118.exe windows:4 windows x86 arch:x86
b47ff395cc70123258817860c62fd641
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
GopherFindFirstFileA
InternetSetOptionExA
SetUrlCacheEntryInfoA
FtpRemoveDirectoryA
InternetTimeFromSystemTime
InternetSetOptionA
InternetOpenUrlA
FtpCreateDirectoryW
comctl32
InitCommonControlsEx
user32
GetWindowTextLengthW
GetParent
GetWindowWord
RegisterClassA
TranslateMDISysAccel
GetClassLongA
DrawFrameControl
wvsprintfA
ReleaseCapture
IsWindowEnabled
IsWindowVisible
DlgDirSelectComboBoxExA
CreateIcon
CharToOemA
VkKeyScanA
GetWindowLongW
ExcludeUpdateRgn
SetMenuInfo
TrackMouseEvent
AnimateWindow
EnumDisplaySettingsW
RegisterClassExA
SetWindowsHookA
kernel32
LeaveCriticalSection
GetTimeZoneInformation
CreateFileA
CompareStringA
HeapFree
FreeLibrary
InterlockedDecrement
VirtualFree
GetLocaleInfoA
HeapSize
CreateMutexA
SetHandleCount
ExitProcess
DeleteCriticalSection
GetFileType
GetStdHandle
InitializeCriticalSectionAndSpinCount
TlsFree
Sleep
TlsAlloc
FreeEnvironmentStringsW
OpenMutexA
GetEnvironmentStringsW
SetFilePointer
GetProcessHeaps
GetCurrentThreadId
GetStringTypeA
GetConsoleCP
InitializeCriticalSection
DebugActiveProcess
GetTickCount
TlsGetValue
QueryPerformanceCounter
HeapCreate
HeapReAlloc
GetOEMCP
CompareStringW
UnhandledExceptionFilter
HeapDestroy
LCMapStringW
SetConsoleCtrlHandler
ReadFile
WriteConsoleA
LCMapStringA
GetCommandLineA
GetDiskFreeSpaceExW
VirtualQuery
SetEnvironmentVariableA
GetCurrentProcessId
InterlockedIncrement
GetTimeFormatA
GetCurrentThread
IsDebuggerPresent
IsValidLocale
GetCurrentProcess
EnterCriticalSection
GetProcAddress
lstrcpynA
WideCharToMultiByte
GetModuleHandleW
CloseHandle
GetLastError
GetLocaleInfoW
EnumSystemLocalesA
WriteConsoleW
GetConsoleMode
GetCPInfo
GetDateFormatA
GetConsoleOutputCP
GetPrivateProfileSectionNamesA
HeapAlloc
FlushFileBuffers
TlsSetValue
GetACP
LoadLibraryA
FreeEnvironmentStringsA
GetDiskFreeSpaceExA
SetFileAttributesW
SetLastError
VirtualAlloc
GetModuleHandleA
GlobalAddAtomW
GetStringTypeW
GetEnvironmentStrings
SetStdHandle
TerminateProcess
OpenWaitableTimerW
GetSystemTimeAsFileTime
GetModuleFileNameA
IsValidCodePage
GetStartupInfoA
InterlockedCompareExchange
WriteFile
SetUnhandledExceptionFilter
FreeResource
OpenSemaphoreA
RtlUnwind
MultiByteToWideChar
InterlockedExchange
GetUserDefaultLCID
shell32
SHGetPathFromIDListW
gdi32
CreateRectRgn
CreateEnhMetaFileW
SetTextCharacterExtra
EnumICMProfilesA
GetClipBox
SelectPalette
OffsetRgn
GetEnhMetaFileA
GetNearestPaletteIndex
ExtCreatePen
LineDDA
SetStretchBltMode
GdiPlayDCScript
CombineRgn
AddFontResourceA
EnableEUDC
Sections
.text Size: 190KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ