c:\Users\User\Desktop\fuckMccafy\Release\GDI03.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb84446224399d6d26dd324d0b31092b_JaffaCakes118
-
Size
449KB
-
MD5
eb84446224399d6d26dd324d0b31092b
-
SHA1
4bfb1c14561cb9248a37b9998f02ea3939af0d45
-
SHA256
77be131f564e23d42003c5ccb3ba765e2ecc66d28b0087f3d5313cf2814fcf84
-
SHA512
cd1e31e48851026551b73a3c75ea9c21c60e7987881998dbcaa931d91d01e642d42215c1b90c38f3d19590864a26d00e0192357d894c9dd46fa9a56a59cdb9e9
-
SSDEEP
6144:0NF65XrsQF8FfevZRMPhIbHAtLh4IsuZCPHwI4Gdzi81AOLF:0NF65bvCF2zMybHTHwIpdm8RL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb84446224399d6d26dd324d0b31092b_JaffaCakes118
Files
-
eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe windows:5 windows x86 arch:x86
d1b86ddece015504410e96578091b437
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
ord6
kernel32
FormatMessageA
GetLastError
ReadFile
CloseHandle
GetFileSize
CreateFileA
CompareStringW
CompareStringA
FlushFileBuffers
GetTimeZoneInformation
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringW
LCMapStringA
CreateFileMappingW
LocalFree
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetLocaleInfoA
GetLocaleInfoW
HeapSize
GetConsoleMode
GetConsoleCP
SetFilePointer
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
InterlockedExchange
FreeLibrary
FindResourceA
LoadResource
SizeofResource
LockResource
GetModuleFileNameW
CopyFileW
ExitProcess
LoadLibraryW
MultiByteToWideChar
GetProcAddress
MapViewOfFile
GetStringTypeW
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapFree
RtlUnwind
RaiseException
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
HeapDestroy
GetModuleHandleW
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetEnvironmentVariableA
user32
CreateMenu
AppendMenuA
SetMenu
SetScrollInfo
BeginPaint
FillRect
EndPaint
ScrollWindowEx
GetWindowLongA
SendMessageA
SetWindowTextA
GetClientRect
MoveWindow
SetCursor
GetDC
InvalidateRect
PostQuitMessage
DefWindowProcA
MessageBoxA
ShowWindow
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
UpdateWindow
GetSystemMetrics
GetMessageA
TranslateMessage
DispatchMessageA
ShowCursor
gdi32
BitBlt
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetDIBitsToDevice
DeleteObject
GetStockObject
CreateSolidBrush
comdlg32
GetOpenFileNameA
shell32
ShellExecuteW
Sections
.text Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 269KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ