d:\xqrea\fakyude\xoghg\sklvhp\jooeoa\eoe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dc9778459ba360d10ffc39a9f00fd983_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc9778459ba360d10ffc39a9f00fd983_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc9778459ba360d10ffc39a9f00fd983_JaffaCakes118
-
Size
608KB
-
MD5
dc9778459ba360d10ffc39a9f00fd983
-
SHA1
a111d0a5f4f6d6bb8f682eed8f1d6513df2ffb51
-
SHA256
000cae426f37caaea36454a71c0e8a140d4dab4342c30d6fca025dea3ddb047b
-
SHA512
25bd4e1a2a675932dae1b17b6cf2d4c7f62c80c8319fc5c7fa47e6b0d08749b5f138a2e1f5c187e2acaa624fd55a80c64d9c6ec9bdb18cb231c2eb8fb821b76d
-
SSDEEP
6144:z2EAiY3KwOxcBMy7R5K0k18saNzddDnSJGNywuBupk4dbFAqYvZZiaRI5MAkf41k:z21iYawmW48Hc8cl4ZFAqcz94Ypuzc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc9778459ba360d10ffc39a9f00fd983_JaffaCakes118
Files
-
dc9778459ba360d10ffc39a9f00fd983_JaffaCakes118.exe windows:4 windows x86 arch:x86
6ec87d84dc7e097a95fed67633d4afcb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DragDetect
CountClipboardFormats
EndTask
DestroyWindow
ShowWindowAsync
IsDlgButtonChecked
TabbedTextOutA
GetKeyboardLayoutList
CharPrevW
CreateWindowExA
GetClassInfoExA
GetGuiResources
DdeFreeStringHandle
CheckMenuItem
RegisterClassA
DrawStateA
IsRectEmpty
LoadMenuA
ShowWindow
GetMenuStringW
DlgDirListA
ClientToScreen
SetWindowContextHelpId
GetMenuStringA
GetCursor
CreateDesktopW
SetWindowTextA
PostMessageA
DestroyMenu
MessageBoxA
LoadCursorFromFileW
SetFocus
CallMsgFilter
RegisterClassExA
SetSystemCursor
DialogBoxParamA
FlashWindowEx
GetMessagePos
GetMenuDefaultItem
ReplyMessage
DrawIcon
EnableScrollBar
DefWindowProcW
SetWindowsHookExA
InvalidateRect
ChangeClipboardChain
IsCharLowerW
kernel32
HeapFree
GetCurrentProcessId
TlsSetValue
GetUserDefaultLCID
EnterCriticalSection
HeapReAlloc
SetHandleCount
FlushInstructionCache
GetModuleFileNameA
RtlUnwind
EnumCalendarInfoA
CloseHandle
IsBadWritePtr
OutputDebugStringW
WriteFile
HeapDestroy
VirtualQuery
GetEnvironmentStringsW
GetStringTypeW
GetTickCount
VirtualAlloc
FreeResource
IsBadReadPtr
GetModuleFileNameW
InterlockedExchange
GetLocaleInfoW
LeaveCriticalSection
EnumDateFormatsA
GetCommandLineA
GetProcAddress
CompareStringW
LCMapStringW
HeapSize
GetTimeFormatA
TlsGetValue
GetCurrentProcess
GetModuleHandleA
InitializeCriticalSection
FlushFileBuffers
DeleteCriticalSection
GetEnvironmentStrings
CompareStringA
QueryPerformanceCounter
GetCPInfo
GetOEMCP
GetDateFormatA
GetTempPathA
GetLastError
HeapAlloc
GetStringTypeA
TlsAlloc
GetStartupInfoW
FreeEnvironmentStringsA
GetSystemInfo
ExitProcess
VirtualFree
GetFileType
VirtualProtect
ReadFile
TerminateProcess
SetStdHandle
UnhandledExceptionFilter
LCMapStringA
IsValidLocale
GetCurrentThread
HeapCreate
GetStartupInfoA
GetLocaleInfoA
FreeEnvironmentStringsW
GetCurrentThreadId
IsValidCodePage
CreateMutexA
GetSystemTimeAsFileTime
OpenMutexA
SetFilePointer
EnumSystemLocalesA
GetCommandLineW
LoadLibraryA
GetVersionExA
SetEnvironmentVariableA
GetStdHandle
TlsFree
WideCharToMultiByte
DeleteFileA
MultiByteToWideChar
SetConsoleScreenBufferSize
GetACP
SetThreadIdealProcessor
SetLastError
GetTimeZoneInformation
comctl32
GetEffectiveClientRect
DestroyPropertySheetPage
ImageList_SetFilter
ImageList_GetDragImage
ImageList_GetBkColor
ImageList_DragEnter
ImageList_SetIconSize
ImageList_AddMasked
DrawStatusTextW
DrawInsert
InitCommonControlsEx
ImageList_Add
ImageList_Write
ImageList_GetImageRect
ImageList_GetImageCount
ImageList_SetImageCount
ImageList_SetFlags
ImageList_Copy
_TrackMouseEvent
CreateUpDownControl
Sections
.text Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ