e:\udawppi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eaa58f21050ba678951971592b348620_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa58f21050ba678951971592b348620_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaa58f21050ba678951971592b348620_JaffaCakes118
-
Size
344KB
-
MD5
eaa58f21050ba678951971592b348620
-
SHA1
ad76b853cc10e3c3d08ea65c8e0803fbcd8307d6
-
SHA256
3ff0e325c43b3e9c1106ffbcce2dc4dd56b0f149111e7ae43df7ac6e74314a07
-
SHA512
852910d4278f90ca583dcb8def7b1842784794ebb09fd6760fca3bdc0952dcf0603df3000a8777b1d73b9747395d1e575986091e76266c8bc732dfb6dc44f8d3
-
SSDEEP
6144:W4MiRFQegs9SoPMLhCLojQO0nLnuvEiPl491vp9c9z:WZyPSnFCLo0RLoEJ1vA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eaa58f21050ba678951971592b348620_JaffaCakes118
Files
-
eaa58f21050ba678951971592b348620_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c8da1173f6ead2765802a003b5e3059
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
ChooseColorW
GetOpenFileNameA
user32
WindowFromPoint
LoadMenuA
CloseWindow
SetMessageExtraInfo
RegisterClassExA
CreateMenu
ShowWindow
DefWindowProcW
GetShellWindow
GetGUIThreadInfo
GetPropA
DefDlgProcA
MessageBoxW
DdeSetUserHandle
SetWindowsHookExA
OpenInputDesktop
SubtractRect
MsgWaitForMultipleObjectsEx
GetClipCursor
IsCharUpperA
EnumDesktopsA
DdeQueryConvInfo
DlgDirSelectExW
SendIMEMessageExA
GetNextDlgTabItem
GetUserObjectSecurity
CreateWindowExW
DestroyWindow
RealChildWindowFromPoint
CharToOemA
DialogBoxIndirectParamW
RemoveMenu
SetWindowPlacement
RegisterClassA
LoadKeyboardLayoutW
SetPropW
CallMsgFilterW
wvsprintfA
GetCaretPos
GetClipboardSequenceNumber
EnumDisplayMonitors
CharLowerBuffA
SetWindowsHookA
DialogBoxParamW
SetWindowContextHelpId
ValidateRgn
SetDeskWallpaper
CharNextExA
comctl32
CreateStatusWindowW
ImageList_SetIconSize
ImageList_GetDragImage
CreateStatusWindow
CreatePropertySheetPageW
ImageList_GetFlags
ImageList_Write
ImageList_DragMove
ImageList_SetDragCursorImage
ImageList_SetFilter
ImageList_AddIcon
ImageList_AddMasked
InitMUILanguage
GetEffectiveClientRect
ImageList_Read
ImageList_Merge
CreateMappedBitmap
InitCommonControlsEx
ImageList_GetImageCount
ImageList_DrawIndirect
ImageList_SetBkColor
CreateStatusWindowA
ImageList_Add
ImageList_GetBkColor
ImageList_Draw
shell32
SHGetDataFromIDListW
ExtractIconExW
SHFileOperation
FreeIconList
kernel32
GetMailslotInfo
CreateMutexA
SystemTimeToTzSpecificLocalTime
CompareStringW
UnmapViewOfFile
GetTimeFormatA
WriteFile
GetCommandLineA
VirtualQuery
SetWaitableTimer
GetFileType
SetConsoleCtrlHandler
InitializeCriticalSection
LocalSize
HeapReAlloc
EnumCalendarInfoW
DeleteCriticalSection
TlsAlloc
Sleep
HeapAlloc
EnterCriticalSection
EnumSystemLocalesW
GetVersionExA
CloseHandle
GetEnvironmentStringsW
GetNumberFormatA
FreeLibrary
InterlockedExchange
SetPriorityClass
EnumResourceTypesW
GetEnvironmentStrings
CreateSemaphoreA
FlushFileBuffers
LoadLibraryExW
MultiByteToWideChar
WriteConsoleW
GetFileAttributesW
ExitProcess
GetLastError
GetDiskFreeSpaceExA
GetConsoleMode
SetThreadContext
LeaveCriticalSection
OpenSemaphoreA
GetSystemInfo
GetLocaleInfoA
SetEnvironmentVariableA
SetVolumeLabelA
GetProcAddress
TlsFree
HeapDestroy
WriteProfileSectionW
GetPrivateProfileSectionNamesW
SetLocalTime
GetModuleHandleA
TlsGetValue
CreateDirectoryExA
GetCompressedFileSizeW
HeapFree
GetUserDefaultLCID
GetCurrentThread
LoadLibraryA
FreeLibraryAndExitThread
TransmitCommChar
LocalHandle
TlsSetValue
GetTickCount
GetConsoleCP
InterlockedIncrement
VirtualFree
HeapCreate
SetConsoleWindowInfo
VirtualAlloc
TerminateProcess
GetStdHandle
GetConsoleOutputCP
LocalFileTimeToFileTime
IsDebuggerPresent
EnumSystemLocalesA
IsValidCodePage
GetCurrentThreadId
GetShortPathNameA
CreateMailslotA
GetTimeZoneInformation
SetLastError
InterlockedDecrement
LCMapStringW
WritePrivateProfileStructA
CompareStringA
FreeEnvironmentStringsA
GetEnvironmentVariableA
CopyFileA
WideCharToMultiByte
FileTimeToLocalFileTime
SetHandleCount
FindResourceExA
GetModuleFileNameA
GetConsoleTitleW
GetCurrentProcessId
CreatePipe
GetStringTypeExW
lstrcmpA
GlobalUnfix
WriteConsoleA
SetFilePointer
RtlUnwind
VirtualProtect
LCMapStringA
UnhandledExceptionFilter
CreateFileA
GetDateFormatA
GetCPInfo
GetProfileStringA
SetStdHandle
SetCriticalSectionSpinCount
GetSystemTimeAsFileTime
OpenMutexA
LocalUnlock
SetEndOfFile
lstrcpyW
GetProcessHeap
FreeEnvironmentStringsW
GetStringTypeA
GetStringTypeExA
GetStartupInfoA
WriteConsoleInputA
SetUnhandledExceptionFilter
GetStringTypeW
QueryPerformanceCounter
GetCurrentProcess
HeapSize
IsValidLocale
GetLocaleInfoW
ReadFile
GetACP
SetConsoleScreenBufferSize
GetOEMCP
CreateToolhelp32Snapshot
MoveFileExA
HeapLock
Sections
.text Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ