m:\okoxb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
db27315c29821260619b803c674bc63b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db27315c29821260619b803c674bc63b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db27315c29821260619b803c674bc63b_JaffaCakes118
-
Size
392KB
-
MD5
db27315c29821260619b803c674bc63b
-
SHA1
38f2d23ac4f4df4a4c5bfc2272c5a718bb04809e
-
SHA256
ff4bb1ec7fd9e3226c4af013c100511277cb5372df9184407783ed67efe51d96
-
SHA512
44c778a3c0408fcb8c13b00dc72e34627df9fd53a18b9e363446ba95f1749213b7473b01b7e28ef569eefc80147d352fadecd293e4b4e7931c852bffe141c737
-
SSDEEP
6144:kbsqr9mpixHISBOXUhdBtE8vfzQSyd8fJdO84DVUbvy:kYqr9ei9ISBOydbrvrnyd8fPO84WO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db27315c29821260619b803c674bc63b_JaffaCakes118
Files
-
db27315c29821260619b803c674bc63b_JaffaCakes118.exe windows:4 windows x86 arch:x86
a92a32334da433e50afa61c4a7288e12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetOpenFileNameW
user32
OpenWindowStationW
UnregisterClassA
MsgWaitForMultipleObjects
DialogBoxParamA
DrawFrameControl
DestroyMenu
ClipCursor
GetSubMenu
SendNotifyMessageA
SendIMEMessageExW
CloseDesktop
GetClassInfoExW
GetClipboardSequenceNumber
CreateWindowExW
LoadCursorW
BeginDeferWindowPos
DdeUnaccessData
IsWindow
DdeInitializeA
DefWindowProcA
SetDlgItemTextA
CharToOemA
EnumDesktopsW
DdeConnect
GetWindowLongW
GetWindowPlacement
EnumWindowStationsA
GetWindowRect
ClientToScreen
CloseWindowStation
CharToOemW
EnumDisplayDevicesA
LockWindowUpdate
InsertMenuItemW
RegisterClipboardFormatA
LoadMenuW
DestroyWindow
IsRectEmpty
IsClipboardFormatAvailable
RegisterDeviceNotificationW
ToAsciiEx
DdeDisconnect
DlgDirListA
SetClassLongW
CreateCursor
SetClassWord
CharUpperBuffW
DefWindowProcW
DdeReconnect
GetDlgItemTextA
ShowWindow
GetClassInfoExA
DrawMenuBar
OemToCharA
SetDlgItemTextW
SetWindowWord
SetMenuItemInfoW
DlgDirSelectComboBoxExW
NotifyWinEvent
GetProcessDefaultLayout
VkKeyScanExW
LoadCursorFromFileA
OpenDesktopA
SetCursorPos
CallWindowProcA
PostMessageA
MessageBoxA
SetWindowPos
OemKeyScan
IntersectRect
DragDetect
EndDeferWindowPos
ScrollWindow
EnableWindow
IsWindowVisible
TrackPopupMenuEx
GetClipboardFormatNameA
ShowWindowAsync
RegisterClassExA
GetSysColor
LoadMenuA
SendInput
GetAsyncKeyState
GetSystemMenu
MonitorFromWindow
CreateWindowStationA
GetUpdateRect
OpenWindowStationA
ArrangeIconicWindows
EnableMenuItem
DlgDirSelectComboBoxExA
RegisterClassA
EnumWindowStationsW
PaintDesktop
wsprintfA
RemovePropA
DdeClientTransaction
CallMsgFilter
SetWindowsHookExW
SetMessageExtraInfo
comctl32
ImageList_GetFlags
CreateStatusWindowW
InitCommonControlsEx
ImageList_SetImageCount
GetEffectiveClientRect
ImageList_Write
ImageList_SetFilter
ImageList_DrawEx
ImageList_SetFlags
ImageList_LoadImageA
ImageList_Remove
CreateStatusWindow
ImageList_GetBkColor
ImageList_EndDrag
ImageList_SetOverlayImage
ImageList_Replace
DrawStatusTextA
ImageList_Merge
CreatePropertySheetPage
CreateMappedBitmap
ImageList_LoadImageW
CreatePropertySheetPageW
ImageList_DrawIndirect
kernel32
GetShortPathNameW
InterlockedIncrement
GetSystemDefaultLangID
TlsSetValue
GetProcAddress
GetLocaleInfoA
GlobalReAlloc
ReadFileEx
EnumTimeFormatsA
VirtualAlloc
HeapCreate
SetUnhandledExceptionFilter
SetLocaleInfoW
SetLastError
CloseHandle
GetCommandLineW
FreeLibrary
DeleteCriticalSection
EnumSystemLocalesA
SetConsoleScreenBufferSize
CreateMailslotA
TlsAlloc
WriteFile
ExitProcess
Sleep
CreateDirectoryW
CreateProcessA
HeapValidate
GetAtomNameA
GetACP
SetFilePointer
RtlUnwind
WideCharToMultiByte
CreateFileA
GetPrivateProfileSectionW
GetCPInfo
FindAtomA
SetHandleCount
GetPrivateProfileSectionNamesW
GetConsoleOutputCP
GetTimeZoneInformation
AddAtomW
GlobalAlloc
GetStringTypeA
SetStdHandle
GetConsoleMode
WritePrivateProfileSectionA
GetCurrentProcess
GetStdHandle
GetFileType
GetEnvironmentStringsW
HeapSize
FindAtomW
QueryPerformanceCounter
SetCurrentDirectoryA
GetModuleFileNameA
OpenEventA
WriteConsoleA
InitializeCriticalSection
UnhandledExceptionFilter
IsDebuggerPresent
FindResourceA
GetLocaleInfoW
LoadLibraryA
LeaveCriticalSection
SetConsoleCtrlHandler
GetTimeFormatA
GetCurrentThreadId
GetOEMCP
TerminateProcess
TlsGetValue
EnterCriticalSection
lstrcpynW
ReadFile
HeapDestroy
LocalFree
GetProcessHeap
GetStartupInfoW
MoveFileExW
InterlockedDecrement
IsValidLocale
SetFileAttributesW
MoveFileExA
OpenMutexA
WaitForMultipleObjects
GetStartupInfoA
SetComputerNameW
ReadConsoleA
CreateMutexA
SetFileAttributesA
GetCurrentThread
RemoveDirectoryW
SleepEx
LockResource
GlobalAddAtomA
HeapFree
GetProfileIntW
GetCurrentDirectoryA
GetNamedPipeHandleStateW
LCMapStringW
WriteConsoleW
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
CreateEventW
GetCommandLineA
GetStringTypeW
GetConsoleCP
GetModuleFileNameW
lstrlenW
GetLastError
GetVersionExA
VirtualQuery
GetEnvironmentStrings
GetUserDefaultLCID
CompareStringW
HeapAlloc
VirtualFree
HeapReAlloc
SetEnvironmentVariableA
FlushFileBuffers
TlsFree
IsValidCodePage
GetProcessAffinityMask
LCMapStringA
ConvertDefaultLocale
MultiByteToWideChar
FreeEnvironmentStringsA
FlushViewOfFile
GetCurrentProcessId
GetDateFormatA
InterlockedExchange
GetModuleHandleA
SuspendThread
GetCurrentDirectoryW
GetTickCount
CompareStringA
Sections
.text Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ