W:\FbSFIAyTNCcST\DmeVhHU\EulvgLGntnE\WwhWSiNmIcsubd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d47c604eed474702b6af318cef1a263f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d47c604eed474702b6af318cef1a263f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d47c604eed474702b6af318cef1a263f_JaffaCakes118
-
Size
45KB
-
MD5
d47c604eed474702b6af318cef1a263f
-
SHA1
fd981641283d0a50789115a21be65dce39715494
-
SHA256
556c38e66d103feb9cf9b8b5af8c6cb4a473d2a0c4fcb4e70adc3295d7cbfca4
-
SHA512
a12313bc1a41d0c42a69466fe8024470c82572b0f6eea9ff1a70b3f0b174af44d4b0c21c1175a37d4283c188e4eb26f252fd65f1a2b200ddd2ff006cf3d0006d
-
SSDEEP
768:J8hOygOc5RA4dTucxNFAaxF+W0IXwZTrI8SyNuQlQ:J8hOy05R2cxNFB0mkTrI8Sj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d47c604eed474702b6af318cef1a263f_JaffaCakes118
Files
-
d47c604eed474702b6af318cef1a263f_JaffaCakes118.exe windows:5 windows x86 arch:x86
39dca106251fbc5f11ee6cbee20a8c4c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
exit
gdi32
GetSystemPaletteUse
GetNearestPaletteIndex
GetTextExtentPoint32A
CombineRgn
SetPixel
ExtTextOutA
CreateDIBitmap
PathToRegion
BeginPath
CreateRectRgn
CreateRoundRectRgn
CreateDIBSection
kernel32
CreateMailslotW
WaitForMultipleObjectsEx
lstrcatA
lstrcpynW
GlobalHandle
GetSystemTimeAsFileTime
TlsGetValue
CreateRemoteThread
GetStartupInfoW
GetTickCount
SetCommMask
GetModuleHandleA
GetModuleFileNameA
SetEndOfFile
RaiseException
Sleep
LoadLibraryA
SetMailslotInfo
shlwapi
StrStrIW
StrTrimA
StrTrimW
comctl32
ImageList_Create
InitCommonControlsEx
CreatePropertySheetPageW
user32
GetCaretPos
GetWindowLongA
EnumChildWindows
IsDlgButtonChecked
EnumWindows
CharNextW
ToUnicodeEx
MapVirtualKeyA
LoadIconW
DestroyIcon
CharLowerBuffW
ReleaseDC
RemoveMenu
GetClassInfoA
SetSysColors
OemToCharBuffA
InsertMenuW
BringWindowToTop
CharLowerBuffA
RegisterClassExW
GetCursorPos
ActivateKeyboardLayout
EqualRect
SendMessageW
SetWindowTextW
PostMessageA
GetClientRect
DestroyAcceleratorTable
GetMenuCheckMarkDimensions
Exports
Exports
?lazxJPMGZvg_dyzTCQM@@OPPANK@Z
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.form1 Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.form2 Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.form3 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.form4 Size: 512B - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.info Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ