I:\bosdllYIHddahr\goweFyVjnkzPSs\gZfzZUwrqofwz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dfe63887d6f18862af960e7fb0dedaa7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dfe63887d6f18862af960e7fb0dedaa7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dfe63887d6f18862af960e7fb0dedaa7_JaffaCakes118
-
Size
64KB
-
MD5
dfe63887d6f18862af960e7fb0dedaa7
-
SHA1
309d050889553f81e99d4136e3537f9daa0fdeeb
-
SHA256
04a8cda86952cd346971787d80e4097fff38430969da5ed90af6588adc0626a8
-
SHA512
34f8c2ace57c32f55c0f3631461e7977fc6fbc25669debe15e4739851031aeb01b95369f868209a5dd019e57d01b7995d3f5e4596d051087df475db68c640a57
-
SSDEEP
1536:ZpAyXt+AqBV/oQqmYdNfPLngoUOwtjeO1CP9fmfwEhx3/O0qW:ZpANvwQqmeNDgiJP9fkwEhx39qW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dfe63887d6f18862af960e7fb0dedaa7_JaffaCakes118
Files
-
dfe63887d6f18862af960e7fb0dedaa7_JaffaCakes118.exe windows:5 windows x86 arch:x86
4807ababc00910adafb72f808114aaf5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
isxdigit
_controlfp
wcschr
free
wcsrchr
wcstoul
strtoul
islower
swprintf
memset
isspace
towlower
ftell
__set_app_type
strcoll
iswxdigit
putc
__p__fmode
mbstowcs
__p__commode
fwrite
_amsg_exit
iswprint
strtol
wcspbrk
isalnum
floor
_initterm
gmtime
_ismbblead
fclose
iswctype
_XcptFilter
srand
_exit
setlocale
tolower
fread
isprint
vsprintf
strstr
_cexit
printf
setvbuf
wcstok
__setusermatherr
__getmainargs
towupper
user32
GetKeyboardLayoutNameW
GetShellWindow
CreateMenu
MapVirtualKeyExW
GetAsyncKeyState
DestroyAcceleratorTable
CheckRadioButton
DispatchMessageW
IsDialogMessageA
ToUnicodeEx
GetMenuItemInfoW
SendDlgItemMessageW
GetFocus
GetClassNameW
TileWindows
IsWindowEnabled
IsWindow
SetMenu
GetWindowLongW
DrawStateA
EnableMenuItem
RemoveMenu
ValidateRect
GetUpdateRgn
InSendMessageEx
EndDialog
HiliteMenuItem
GetClassLongA
ExitWindowsEx
DeferWindowPos
CharUpperW
GetWindow
GetKeyboardLayout
DialogBoxIndirectParamW
ChildWindowFromPoint
GetNextDlgGroupItem
EnumChildWindows
IsCharAlphaA
DialogBoxParamA
GetMenu
MessageBoxW
GetParent
DrawIconEx
DrawStateW
SendMessageA
MapVirtualKeyA
SendMessageW
SendNotifyMessageW
SetCursor
SendDlgItemMessageA
SetRectEmpty
GetActiveWindow
wvsprintfA
EndPaint
GetSystemMenu
GetDlgItem
LoadImageW
DrawTextExW
GetClassInfoA
EqualRect
GetCaretPos
AppendMenuW
GetKeyNameTextW
ShowWindow
RegisterClassExA
CloseDesktop
CallWindowProcA
GetDlgItemTextW
GetDlgCtrlID
DefDlgProcW
wvsprintfW
GetScrollInfo
SetWindowLongW
ShowOwnedPopups
SetPropW
DrawTextA
CharToOemW
CharUpperBuffA
SetFocus
CharUpperA
DefWindowProcW
GetWindowPlacement
GetClassLongW
wsprintfA
CreateCaret
InsertMenuW
GetClientRect
CreateIconIndirect
GetIconInfo
DialogBoxParamW
LoadCursorA
RegisterClassExW
CreateIconFromResource
FindWindowA
WindowFromPoint
SetDlgItemTextA
RegisterHotKey
PostThreadMessageW
SetDlgItemTextW
IsDlgButtonChecked
DefFrameProcA
KillTimer
SetWindowTextW
FindWindowExW
GetMenuStringW
SetClassLongW
IsCharAlphaNumericW
WaitMessage
GetClassInfoExA
CreateDialogIndirectParamW
ModifyMenuW
GetForegroundWindow
VkKeyScanA
ReplyMessage
WaitForInputIdle
ShowCaret
MoveWindow
DestroyCursor
GetSysColor
IsCharUpperA
DestroyWindow
IntersectRect
GetWindowTextW
SendMessageTimeoutW
comdlg32
GetSaveFileNameW
GetFileTitleW
PrintDlgExW
PrintDlgW
kernel32
lstrcpyW
lstrcmpW
GlobalFree
LoadLibraryExA
GlobalDeleteAtom
FileTimeToLocalFileTime
FindResourceW
HeapAlloc
GetStartupInfoA
IsBadWritePtr
lstrcpynA
FlushViewOfFile
GetCommandLineA
CreateRemoteThread
SetCommBreak
RaiseException
GetModuleFileNameA
GlobalAddAtomW
GetACP
CreateDirectoryA
CreateEventW
SetupComm
ClearCommBreak
lstrlenA
GetDateFormatA
CompareStringW
MoveFileExW
GetVersionExA
SetLastError
HeapReAlloc
HeapLock
CreateDirectoryW
SetHandleCount
SystemTimeToFileTime
GetFileAttributesA
ResetEvent
DeviceIoControl
GetWindowsDirectoryW
EnumSystemLocalesA
SetUnhandledExceptionFilter
SizeofResource
GetThreadContext
GetFileInformationByHandle
VerifyVersionInfoW
lstrcpynW
GetCurrentThread
CompareStringA
GlobalGetAtomNameA
GetSystemTimeAdjustment
GetSystemTimeAsFileTime
CreateSemaphoreW
GetStdHandle
SetEvent
SetErrorMode
FindResourceA
GetModuleFileNameW
Exports
Exports
?ForceTriangulateA@@YGKDDPAX:O
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reat Size: 512B - Virtual size: 93B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uac Size: 1KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.riat Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.byte Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vdata Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ