C:\usaJzhRljayUw\nrWwena\fkrxYonvvk\bdyylql\thgdkyyx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d3d04e6b6faf3c0824632cf7b8070031_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3d04e6b6faf3c0824632cf7b8070031_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3d04e6b6faf3c0824632cf7b8070031_JaffaCakes118
-
Size
153KB
-
MD5
d3d04e6b6faf3c0824632cf7b8070031
-
SHA1
9c15233cd5530fb3dc0ea4b686579208c7420aa2
-
SHA256
2913d0661af4a2dd88a4861cf6df375fb467b32e18ff066f5cc88276e7121224
-
SHA512
ae8f15228c913d89c569c0a7d8fc4c7a44e98f766515e4ac2e696a09d76e50c9a2ce21f924ade07bbcf6fcf737ea41b8d1575d577585cfa627c85ecba978ad11
-
SSDEEP
3072:PVbUHweul/9g/E5gpkjO/jkHdS8Jw6FHp0iHMcyyZTxk9aVdUh9t:C/uc85hO/4LwAHawd/Z1ksVmTt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3d04e6b6faf3c0824632cf7b8070031_JaffaCakes118
Files
-
d3d04e6b6faf3c0824632cf7b8070031_JaffaCakes118.exe windows:5 windows x86 arch:x86
dc1319ae9b2d6c425c37bd312135081b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
GetObjectW
EnumFontsW
EndPage
SetDIBits
GetTextColor
SetBitmapDimensionEx
SetViewportOrgEx
GetTextExtentPointA
GetSystemPaletteUse
Escape
SetTextColor
CreateDIBSection
SetWindowOrgEx
CombineRgn
SetBkMode
GetCurrentObject
SetROP2
GetObjectA
CreateICW
RealizePalette
RestoreDC
GetTextExtentPoint32W
CreatePen
IntersectClipRect
ExtFloodFill
CreateFontA
CreateRectRgnIndirect
CreateDCW
EnumFontFamiliesExW
Ellipse
GetViewportOrgEx
FillRgn
BeginPath
PolyBezier
ExtTextOutW
StretchBlt
GetTextMetricsA
SetPaletteEntries
kernel32
GetComputerNameA
DeviceIoControl
GetTempFileNameA
LocalLock
CreateMutexW
Sleep
SetFileApisToOEM
SetUnhandledExceptionFilter
ReleaseSemaphore
SetSystemTimeAdjustment
RegisterWaitForSingleObject
CreateMutexA
ClearCommBreak
SetLocalTime
lstrcmpW
FindNextFileA
OpenFile
GetTickCount
SetHandleInformation
GlobalAddAtomA
UnmapViewOfFile
EnumResourceNamesW
GetCommandLineA
GetUserDefaultLCID
HeapUnlock
GetTempPathA
lstrlenA
HeapLock
GetFileAttributesW
FormatMessageW
DisconnectNamedPipe
CreateRemoteThread
LockResource
IsBadWritePtr
CreateThread
CreateDirectoryA
CancelIo
EscapeCommFunction
FindFirstFileA
GetSystemDefaultUILanguage
PulseEvent
user32
CreateDialogParamW
FindWindowExA
CharLowerW
SetRectEmpty
PostThreadMessageA
SetCursorPos
RegisterWindowMessageA
DrawTextExW
SwitchToThisWindow
InternalGetWindowText
ShowWindow
InvalidateRect
CreateCaret
SetWindowPlacement
SetForegroundWindow
InsertMenuItemW
SetPropW
wsprintfW
SendMessageTimeoutW
ScrollWindowEx
DragObject
GetWindowPlacement
EnableMenuItem
DialogBoxParamA
AdjustWindowRectEx
SetSysColors
DestroyWindow
GetClassInfoExW
DefFrameProcW
CharUpperA
OpenInputDesktop
ExitWindowsEx
OpenIcon
ScrollWindow
IsWindowUnicode
ChildWindowFromPoint
CloseDesktop
PostQuitMessage
ClipCursor
EnableScrollBar
WaitMessage
GetNextDlgTabItem
MapDialogRect
IsCharAlphaNumericW
LookupIconIdFromDirectory
OemToCharA
SetDlgItemInt
LockWindowUpdate
CallWindowProcW
ShowCaret
TranslateAcceleratorA
GetWindowLongA
ChildWindowFromPointEx
LoadBitmapW
MapVirtualKeyA
DrawAnimatedRects
PeekMessageW
GetWindowDC
GetDC
SetParent
GetTopWindow
GetKeyboardLayout
CheckRadioButton
GetAsyncKeyState
DefWindowProcW
CharToOemW
GetDoubleClickTime
GetWindowRect
MoveWindow
CopyAcceleratorTableW
AttachThreadInput
ReplyMessage
GetScrollPos
SetWindowLongW
RegisterWindowMessageW
DestroyCaret
CreateDialogParamA
LoadAcceleratorsW
ChangeMenuW
CreatePopupMenu
GetFocus
RegisterClassExW
SendMessageW
BringWindowToTop
KillTimer
GetWindowLongW
GetDlgItemTextA
SetFocus
DrawStateA
GetUpdateRgn
HideCaret
msvcrt
strerror
fgetc
getc
_controlfp
__set_app_type
sscanf
islower
__p__fmode
__p__commode
free
towupper
gmtime
_amsg_exit
_initterm
strstr
_acmdln
fflush
atol
exit
swprintf
wcscat
mbtowc
wcslen
mbstowcs
_ismbblead
gets
wcscpy
_XcptFilter
_exit
fseek
iswprint
strspn
clearerr
perror
isalpha
_cexit
__setusermatherr
wcstoul
__getmainargs
calloc
Exports
Exports
?CancelName@@YGPAGPAHH_N&U
?CancelCommandLineExW@@YGEKPAIPAJ&U
?CloseMessageExW@@YGXPAH_NJ&U
?HideHeightEx@@YGNMPAIJ&U
?GlobalMutantOld@@YGXPAMPAM&U
?ValidateTextOriginal@@YGJI&U
?InsertDataNew@@YGIDHEN&U
?CancelFileOriginal@@YGPAJPAEKF_N&U
?RtlPathW@@YGJPAIPAG&U
?DecrementFolderPath@@YGXDKPAEI&U
?PutWidthOriginal@@YGIPAJE&U
?InsertProfileOriginal@@YGFPA_NHK&U
?FindConfigW@@YGPAEF_N&U
?CloseThreadExW@@YGPAXIN&U
?FormatSystemOriginal@@YGPAFHF&U
?GenerateVersionOld@@YGFPAI_N&U
?FreeDateA@@YGPAFPAGPAIKN&U
?FreeWidthExW@@YGPAHGIG&U
?RemoveSize@@YGPAJPAD&U
?FindTimerNew@@YGJPAFMEG&U
?IsNotObjectW@@YGJFPAMI&U
?ValidateRectNew@@YGXIG_N&U
?SendFunctionA@@YGPAHPAJJMG&U
?CallData@@YGPAJMEMF&U
?DecrementListW@@YGPAGPAGPAHPAKPAE&U
?RemoveFileW@@YGXHF&U
?RemoveSystemEx@@YGKMJH&U
?InsertAppNameNew@@YGJPADMFK&U
?DeleteNameA@@YGGPADPAMIM&U
?InvalidateObjectExW@@YGDPAGGHJ&U
?RtlPointNew@@YGHPAIPAK&U
?GenerateValue@@YGPANM&U
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imdat Size: 1024B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ