N:\PyCx\PjqndM\Lbsl\oCXNxZ\amneSj.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eefc46d85cdac43def8f911500fbb6d5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eefc46d85cdac43def8f911500fbb6d5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eefc46d85cdac43def8f911500fbb6d5_JaffaCakes118
-
Size
150KB
-
MD5
eefc46d85cdac43def8f911500fbb6d5
-
SHA1
4ca4e75ed2ce270076a9ca5d6c78cab0945ac3df
-
SHA256
cda90f9206c4e78b733013708843ecc7aefc2fa028fe07d56a2982a7e0719240
-
SHA512
8da3976b2f87ad787a59ce4dae6997962c2712311047dafa94cadea804b240056d6f6fed48f0b52f27c525c5aa5c2f0e85a41704679b75aadb137c127bbf5dde
-
SSDEEP
3072:e5ObYSFdBoewaCVu7CW3YGR+4+CCH7ymy8YC3Az30qzoYGDU2GAsbsmeb105XNd5:As5lozY7IGR+4+Cl3qAzNoYzwNb10T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eefc46d85cdac43def8f911500fbb6d5_JaffaCakes118
Files
-
eefc46d85cdac43def8f911500fbb6d5_JaffaCakes118.exe windows:5 windows x86 arch:x86
36aa1bf6f9e5aa3b0743dcf3416d111f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
ShowCursor
LockWindowUpdate
CharNextA
ChangeMenuW
SetScrollRange
GetWindowTextLengthW
GetTopWindow
DrawFocusRect
GetMenuState
InvertRect
PostThreadMessageA
IntersectRect
IsWindow
GetClientRect
wsprintfW
IsCharAlphaNumericW
IsCharLowerA
GetKeyState
SetSysColors
GetAsyncKeyState
CreatePopupMenu
EnumChildWindows
GetNextDlgTabItem
DispatchMessageA
MessageBoxExW
GetClassLongA
IsWindowUnicode
ReplyMessage
FindWindowExA
BeginPaint
gdi32
CreateHalftonePalette
GetTextExtentExPointW
CreateICW
CreateRectRgn
SaveDC
CreateBitmap
SetROP2
GetTextMetricsW
WidenPath
LPtoDP
StartPage
CreateHatchBrush
ole32
CoInitializeEx
CoUninitialize
kernel32
CreateWaitableTimerA
GetCommProperties
CompareFileTime
GetStartupInfoW
CreateNamedPipeA
WinExec
GetUserDefaultLangID
RemoveDirectoryA
GlobalUnlock
lstrcmpiW
FileTimeToSystemTime
RaiseException
lstrlenW
ReadFile
comctl32
ImageList_Write
ImageList_LoadImageW
ImageList_Destroy
Exports
Exports
?yvc____ysHSnls@@YGPAFKJ@Z
?KRYXO_KjBKNG@@YGXEPAJ@Z
?___PLZEJudxdAYS@@YGEPAG@Z
?ovz_HKXQ@@YGMPAD@Z
?__e_pacgbEFQWLEIH@@YGXJE@Z
?zrDR_AHFqbeIUHkqG_UN_@@YGIPAK@Z
?BJ_Sm_v_kmN_ASOZDx@@YGXF@Z
?us__KJf@@YGPAKMF@Z
?ORIFOYwmr@@YGXM@Z
?HWUZTtpkl@@YGMDPAD@Z
?_ishcxbv_varrpvbsr@@YGIPAJ@Z
?APBNJjj__ck_zZ@@YGJF@Z
?rpzfEULVD_fpgW__Tm_xcg@@YGFJPAE@Z
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ