n:\ocsx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d9ec570acfb22f4c60371a73f49ef25b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9ec570acfb22f4c60371a73f49ef25b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d9ec570acfb22f4c60371a73f49ef25b_JaffaCakes118
-
Size
660KB
-
MD5
d9ec570acfb22f4c60371a73f49ef25b
-
SHA1
e84ce2ec49483f7073c89aa6980a305a0eca7023
-
SHA256
d30b51423ffd074e0df67294b00f86c494cd3a0b6a60f66a26a54440b0cb704d
-
SHA512
dc4a03e4f9c0d8beaa82f5aa3dfc51006c72360f7aabf12fdf5bc1351fbc49f254bf3cb309b5c3ab1a822efcc182a874a030e1b4374c13b87db0b2c90670d5d8
-
SSDEEP
12288:ty5xTb+jTN/9RIDEPm98Y4owJ6+cvYyBTWJ/yyHfPB7d:03Gj5/Xm6h/ATWJ/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d9ec570acfb22f4c60371a73f49ef25b_JaffaCakes118
Files
-
d9ec570acfb22f4c60371a73f49ef25b_JaffaCakes118.exe windows:4 windows x86 arch:x86
dbcbdb3eb60b29fe3222fabb0837bb0d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_AddIcon
ImageList_Merge
ImageList_Replace
CreatePropertySheetPageW
ImageList_LoadImageA
ImageList_Remove
ImageList_SetIconSize
ImageList_SetBkColor
ImageList_Create
ImageList_DrawIndirect
ImageList_SetDragCursorImage
ImageList_SetImageCount
DestroyPropertySheetPage
ImageList_Copy
InitCommonControlsEx
ImageList_EndDrag
ImageList_Destroy
CreatePropertySheetPage
DrawStatusTextW
GetEffectiveClientRect
user32
DestroyWindow
SetProcessDefaultLayout
OpenWindowStationA
SwitchDesktop
RegisterClassA
GetWindowModuleFileNameA
wsprintfA
SendDlgItemMessageA
SetSysColors
BroadcastSystemMessageA
CreateWindowExA
MessageBoxA
ShowWindowAsync
IsCharLowerW
GetDC
CharToOemBuffW
MonitorFromPoint
SetPropA
DdeDisconnectList
DefFrameProcW
DefMDIChildProcA
GetKeyboardLayoutNameA
GetDoubleClickTime
GetKeyboardLayoutList
EnumClipboardFormats
GetInputDesktop
OemToCharBuffW
SetRectEmpty
ReleaseDC
GetMonitorInfoW
ShowWindow
SystemParametersInfoW
DefWindowProcW
GetProcessDefaultLayout
RedrawWindow
SendMessageA
ScrollDC
LoadIconW
GetUserObjectSecurity
RegisterClassExA
kernel32
CreateMutexA
EnterCriticalSection
GetVolumeInformationW
WideCharToMultiByte
EnumResourceLanguagesW
EnumSystemLocalesA
GetStartupInfoW
RtlUnwind
WriteConsoleA
GetVersionExA
TlsAlloc
OpenSemaphoreW
GetACP
HeapReAlloc
TerminateProcess
GetStringTypeW
GetLocaleInfoA
CompareStringA
GlobalFlags
InterlockedDecrement
DeleteCriticalSection
FreeEnvironmentStringsA
CopyFileA
LockFileEx
WriteFile
GetFileType
TlsFree
SetHandleCount
RaiseException
QueryPerformanceCounter
SetLocalTime
GetPrivateProfileSectionNamesA
HeapFree
ReadFile
GetLongPathNameA
GetPrivateProfileStructW
lstrcmpiA
ReadConsoleOutputAttribute
EnumResourceTypesW
WriteConsoleInputW
VirtualQuery
GetComputerNameW
CreatePipe
WriteConsoleW
SetConsoleWindowInfo
TlsSetValue
DeleteFileW
CreateFileA
DeleteFileA
FindResourceW
GetModuleHandleA
HeapSize
UnhandledExceptionFilter
VirtualFree
GetLogicalDrives
GetConsoleMode
SetFilePointer
SetStdHandle
GetModuleFileNameA
GetLocaleInfoW
HeapCreate
GetStringTypeA
GetProcessHeap
GetTimeZoneInformation
LCMapStringA
LCMapStringW
ReadConsoleOutputCharacterW
IsValidLocale
SetEnvironmentVariableA
GetConsoleCP
GetUserDefaultLCID
FreeLibrary
GetTimeFormatA
GlobalGetAtomNameA
CloseHandle
DebugBreak
GetCPInfo
OpenWaitableTimerW
GetEnvironmentVariableW
FlushFileBuffers
CompareStringW
CreateWaitableTimerA
IsDebuggerPresent
SetEnvironmentVariableW
GetDateFormatA
LockFile
LocalFree
EnumSystemCodePagesA
SetConsoleCtrlHandler
MultiByteToWideChar
GetTickCount
VirtualAlloc
ReleaseSemaphore
GetEnvironmentStringsW
EnumTimeFormatsA
GetProfileStringW
GetCompressedFileSizeA
GetConsoleOutputCP
InterlockedExchange
OpenMutexA
GetOEMCP
OpenFileMappingW
SetConsoleCursorInfo
SetUnhandledExceptionFilter
WaitForSingleObjectEx
GetProcAddress
lstrcpyn
RtlFillMemory
GetSystemTimeAsFileTime
HeapDestroy
GetCalendarInfoA
FreeEnvironmentStringsW
GetStartupInfoA
GetStringTypeExA
GetCurrentThreadId
GetDiskFreeSpaceExW
InterlockedIncrement
GetDiskFreeSpaceA
InitializeCriticalSection
EnumSystemCodePagesW
IsValidCodePage
GlobalFindAtomW
GetCurrentProcess
LocalCompact
RemoveDirectoryA
GetLastError
GetStdHandle
GetCurrentProcessId
LeaveCriticalSection
OpenProcess
ContinueDebugEvent
UnmapViewOfFile
LoadLibraryA
OpenSemaphoreA
GetTimeFormatW
GetCommandLineA
GetMailslotInfo
HeapAlloc
GetSystemDirectoryA
TlsGetValue
GetEnvironmentStrings
GetCurrentThread
ExitProcess
Sleep
SetLastError
GetProcessAffinityMask
comdlg32
PrintDlgA
GetFileTitleA
LoadAlterBitmap
Sections
.text Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 308KB - Virtual size: 305KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ