F:\lqizzkm\HZMhMTMp\nqWwPhKQnCk\mqqhldggJonBtg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d6e51fea570f6cce682e1486513617bb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6e51fea570f6cce682e1486513617bb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6e51fea570f6cce682e1486513617bb_JaffaCakes118
-
Size
220KB
-
MD5
d6e51fea570f6cce682e1486513617bb
-
SHA1
0a1ebe1436aaab345b1292bdf692a37d1a0144ec
-
SHA256
676a89d11a3191726b572d213339dc0e095b97c7b92a2af649e607ea976d8408
-
SHA512
c54d16d137c0329b755c691f02754774d4c455058d10b3cc154f0695e6a4c1d7570cbfb93119ef41b4d8686d76342fc1705f9689726beb862f33ab56b0ed6708
-
SSDEEP
6144:tqwxhTLetTlocpeWnygFgRA9ku9Y5ahgxndnt1mx1j:t7xRLeDpeWy/356gLt1C1j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6e51fea570f6cce682e1486513617bb_JaffaCakes118
Files
-
d6e51fea570f6cce682e1486513617bb_JaffaCakes118.exe windows:5 windows x86 arch:x86
81e9ea3fb8b45788208f490fc77d7624
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
LookupIconIdFromDirectory
SetUserObjectInformationW
DestroyWindow
IsDialogMessageA
GetKeyboardLayoutList
TrackPopupMenuEx
TranslateAcceleratorW
DefWindowProcW
SendDlgItemMessageW
IsRectEmpty
MapVirtualKeyA
EnumChildWindows
GetSysColor
EndTask
SetWindowPlacement
SetRect
TranslateMessage
SetCursorPos
CheckDlgButton
DispatchMessageW
GetSubMenu
IsCharAlphaNumericW
SetPropW
CreateMenu
GetMenuState
GetClientRect
ShowWindowAsync
CloseDesktop
DestroyAcceleratorTable
mouse_event
DrawTextW
GetForegroundWindow
GetMenuStringW
ChildWindowFromPoint
SetWindowTextA
IsWindow
GetClassNameW
DrawStateW
CreatePopupMenu
CharUpperBuffW
AllowSetForegroundWindow
SendMessageA
ClientToScreen
GetWindowLongW
ShowOwnedPopups
InvalidateRect
AttachThreadInput
SetLastErrorEx
FindWindowExA
EnumWindows
SendNotifyMessageW
GetKeyNameTextW
AdjustWindowRectEx
SetWindowPos
GetMenuItemRect
BringWindowToTop
EndDialog
CreateDialogParamW
PtInRect
FindWindowExW
ReplyMessage
RegisterClassA
GetMonitorInfoW
GrayStringW
DrawTextA
AdjustWindowRect
SetCursor
wvsprintfW
ShowWindow
CharLowerBuffW
DestroyIcon
MessageBoxA
SetScrollRange
ModifyMenuW
SetScrollPos
GetWindowLongA
RegisterClassW
ReleaseDC
GetMessageExtraInfo
PostThreadMessageW
DeleteMenu
DispatchMessageA
GetWindowTextW
GetSystemMenu
MonitorFromPoint
CheckMenuRadioItem
InsertMenuW
ScrollWindow
MapVirtualKeyW
CreateIconIndirect
UnloadKeyboardLayout
IsMenu
DefFrameProcA
CharNextExA
PostQuitMessage
OffsetRect
CharToOemA
CreateIconFromResource
DefDlgProcW
GetUpdateRgn
SetWindowRgn
LockWindowUpdate
GetClassInfoW
ChangeMenuW
CopyRect
DefWindowProcA
GetAsyncKeyState
SetSysColors
RedrawWindow
CharNextW
msvcrt
strtok
islower
_controlfp
strpbrk
wcscoll
__set_app_type
mbstowcs
__p__fmode
putc
__p__commode
iswctype
sprintf
perror
swscanf
wcsncpy
wcsncmp
iswxdigit
_amsg_exit
time
getenv
_initterm
_ismbblead
vsprintf
_XcptFilter
_exit
wcslen
fprintf
printf
iswspace
rand
puts
_cexit
isalpha
__setusermatherr
wcscpy
wcsstr
strtol
strspn
free
fputc
qsort
__getmainargs
clearerr
isxdigit
psapi
GetProcessImageFileNameA
comdlg32
GetFileTitleW
GetOpenFileNameA
FindTextW
ChooseColorW
PrintDlgExW
kernel32
EnumResourceTypesA
GetTempFileNameA
LoadResource
VirtualProtect
LocalAlloc
GetDateFormatW
lstrcpynW
FindResourceW
GetComputerNameA
CopyFileW
EnterCriticalSection
CallNamedPipeW
FlushViewOfFile
UnlockFile
HeapValidate
ResumeThread
CloseHandle
LoadLibraryA
GetProcessHeap
lstrcpyA
LocalFree
GetCommState
HeapFree
GetComputerNameExA
GetSystemDirectoryA
CreateSemaphoreA
SetFilePointer
FreeResource
GetAtomNameW
PulseEvent
GetFullPathNameW
lstrcmpiA
IsValidLocale
DisconnectNamedPipe
SetThreadLocale
GlobalAddAtomW
GetHandleInformation
SetCommTimeouts
GetSystemDirectoryW
GetTempPathA
GetThreadPriority
IsDBCSLeadByteEx
GetTempFileNameW
GetThreadContext
FindCloseChangeNotification
WideCharToMultiByte
GetCommModemStatus
SetErrorMode
SystemTimeToFileTime
GetOverlappedResult
SetThreadContext
lstrcmpA
HeapAlloc
HeapSize
FindFirstChangeNotificationW
gdi32
BeginPath
GetTextMetricsA
RectInRegion
SelectObject
SetBitmapBits
Ellipse
RestoreDC
ExcludeClipRect
GetPixel
EnumFontFamiliesExW
RoundRect
SetPixel
CreateBrushIndirect
GetStockObject
CreatePolygonRgn
PtInRegion
CreateDCW
EndPage
RectVisible
GetObjectW
RemoveFontResourceW
GetTextCharsetInfo
CreateICW
CreateFontIndirectA
ResizePalette
SetWindowExtEx
UnrealizeObject
DPtoLP
PolyBezier
AddFontResourceW
CreateHalftonePalette
Polygon
GetSystemPaletteEntries
GetROP2
GetTextExtentPoint32A
GetTextExtentPointA
GetClipBox
GetTextExtentPointW
CreateBitmapIndirect
GetPaletteEntries
CreateDIBSection
CreateDIBitmap
StretchBlt
GetObjectA
Escape
StartPage
Exports
Exports
?CallProcess@@YGKMJ]A
?SetScreenEx@@YGXD]A
?LoadPenNew@@YGPAMNGD_N]A
?GlobalMessageNew@@YGPAHPAK]A
?FormatMonitorA@@YGPAXF]A
?GenerateProfileA@@YGKHMM]A
?OnProjectNew@@YGPAEKJDPAG]A
?CrtFilePathW@@YGNPAJPAN]A
?CrtModuleOld@@YGIPAI_NPAG]A
?InvalidateKeyName@@YGJPAJME]A
?FormatPathExW@@YGPAHPAMPAE]A
?IsNotModuleOriginal@@YGHM_NF]A
?FreeSectionW@@YGDKDN]A
?FormatSizeExA@@YGPAX_NPADI_N]A
?MediaTypeOld@@YGXJ]A
?CallCharOriginal@@YGPAKPANFDG]A
?ModifyThreadExW@@YGPAXPA_NPAJ]A
?PutCommandLine@@YGEM]A
?FormatMutexOriginal@@YGPAJPAGHPADF]A
?LoadPointer@@YGGPAG]A
?PutMediaTypeOld@@YGFEPAJ]A
?CallTimerEx@@YGMM_N]A
?EnumPointerExW@@YGX_N_N]A
?CloseDirectoryOld@@YGXPADM]A
?InstallFolderPathExW@@YGMPAJ_N]A
?GenerateProjectEx@@YGPAJHF]A
?IsNotListOriginal@@YGIEFEN]A
?IncrementProviderW@@YGIPAG]A
?PutOptionW@@YGJH]A
?InstallPointA@@YGFPAG_NFPAF]A
?CloseOptionExA@@YGPAXJ]A
?HideFullNameOriginal@@YGPAXKMF]A
?AddDateTimeNew@@YGGPAGPAMHJ]A
?ValidatePathExW@@YGPAXEPAH]A
?IsNotMutantExA@@YGMNPAIFH]A
Sections
.text Size: 185KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ