H:\phIqpWd\gauyyLhbvhJZz\Ynysimes\pjzilbljUfwmw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dd29e590e025dc36a9c644026776227f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd29e590e025dc36a9c644026776227f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd29e590e025dc36a9c644026776227f_JaffaCakes118
-
Size
214KB
-
MD5
dd29e590e025dc36a9c644026776227f
-
SHA1
6650256e06b398be4de19b65c81f61cf5a030761
-
SHA256
4a7050a3210c081709c7bd1a2be87a91c6d11942b659ba14d346ffb24b78763e
-
SHA512
562f41410ede40ea8044b3fd764d790868338e9e32a855f44e0016b532c07bf6660fb34c148c260d7bcd63f78df285529d75235a50a1a7e9f94b18a34336e9c6
-
SSDEEP
3072:XyIgJElPoZXttthlOaGk8MJJrcW2sVIrTg3NaD9xiZjY/43N3LgSiupcXBs9ItO4:XyIQeutnOaGkFJO1iNAsYzA9ItOR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd29e590e025dc36a9c644026776227f_JaffaCakes118
Files
-
dd29e590e025dc36a9c644026776227f_JaffaCakes118.exe windows:5 windows x86 arch:x86
3c7d32bbd74b6c6b85944fb0c4e5a79b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
wcspbrk
_controlfp
__set_app_type
__p__fmode
__p__commode
_amsg_exit
wcschr
_initterm
wcsncmp
_acmdln
exit
wcscat
setlocale
_ismbblead
strcspn
_XcptFilter
_exit
iswprint
_cexit
__setusermatherr
fseek
mbtowc
fputs
__getmainargs
kernel32
lstrcpyW
SetCommMask
SetUnhandledExceptionFilter
OpenEventW
GetFileType
GetCommProperties
SetFileAttributesA
GetTempFileNameA
RegisterWaitForSingleObject
HeapCreate
CreateSemaphoreA
SetFileAttributesW
FindNextFileW
GetLocaleInfoW
GlobalCompact
WaitForSingleObjectEx
SearchPathW
comdlg32
GetSaveFileNameA
GetOpenFileNameA
PrintDlgExW
gdi32
CreateFontIndirectA
GetSystemPaletteEntries
SelectClipRgn
GetDIBits
SetTextColor
ExtTextOutA
SelectObject
CreateDiscardableBitmap
MoveToEx
ResizePalette
SetBkColor
GetDIBColorTable
GetTextCharsetInfo
WidenPath
CreateFontW
user32
FillRect
PostMessageW
IsCharUpperA
CharNextW
AdjustWindowRectEx
LoadStringA
ReplyMessage
CopyImage
GetActiveWindow
GetKeyNameTextW
GetMenuStringW
SetMenuDefaultItem
GetClassInfoW
CopyRect
DestroyAcceleratorTable
TranslateAcceleratorA
IsCharLowerA
DeleteMenu
AttachThreadInput
ScrollWindowEx
FindWindowA
CreateDialogIndirectParamW
IsWindowUnicode
LoadMenuA
PostThreadMessageA
OpenInputDesktop
GetClassInfoExW
CharToOemW
AppendMenuA
ArrangeIconicWindows
DefWindowProcA
MoveWindow
InvertRect
DestroyIcon
MapVirtualKeyExW
Exports
Exports
?CreateEventJUDhfjkldf@@YGKEPA_WG@Z
Sections
.text Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_y Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imul Size: 512B - Virtual size: 166B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.plus Size: 1024B - Virtual size: 695B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ