F:\mpqi\lZwKtn\tydur\cKeUaFg\kujxdrQt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f5128c052a2a4c869e6e8b1e44813256_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5128c052a2a4c869e6e8b1e44813256_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5128c052a2a4c869e6e8b1e44813256_JaffaCakes118
-
Size
141KB
-
MD5
f5128c052a2a4c869e6e8b1e44813256
-
SHA1
240dc79a3b502524cc3364397a274c891ed7ad97
-
SHA256
0c05ee5e8bee03e508763cd31e5f9a320b637a1d97c3c25a3c2bd00b3632fe74
-
SHA512
921a4d8aa9327d91cfd1a0fd27b16c85ca83ddb660629a4cd62f67597330ab152b0218a99942b2ec7f511f229ea4937052a8d26f6574fab8b4ab0c15e553de3e
-
SSDEEP
3072:M8TFrDiH19HF/9kxyuC/Q4Re1gGRvmWtB8pA:HlSfzfnUJHn8p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5128c052a2a4c869e6e8b1e44813256_JaffaCakes118
Files
-
f5128c052a2a4c869e6e8b1e44813256_JaffaCakes118.exe windows:5 windows x86 arch:x86
de196d61c5ee6e8706a3144caa837274
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetPropW
ShowWindow
ExitWindowsEx
IsWindowUnicode
PostThreadMessageW
AdjustWindowRectEx
GetClipCursor
GetMenu
CharNextW
OemToCharA
GetMenuItemInfoW
DialogBoxParamA
SetWindowLongW
FrameRect
GetKeyboardType
GrayStringW
SetWindowRgn
TranslateMessage
EndPaint
GetScrollRange
TabbedTextOutW
ChangeMenuW
SetWindowPos
DrawFocusRect
GetMenuItemCount
ClipCursor
GetMessageExtraInfo
SendInput
DestroyAcceleratorTable
DispatchMessageW
kernel32
UnlockFile
IsDBCSLeadByteEx
CreateFileMappingA
lstrcpynW
GlobalFindAtomW
GetUserDefaultLangID
HeapSize
lstrlenW
CreateFileMappingW
lstrcatA
SystemTimeToFileTime
lstrcmpiW
SetEvent
HeapAlloc
GetCurrentThread
GetFullPathNameW
CreateEventA
TlsGetValue
gdi32
LPtoDP
Polygon
EnumFontFamiliesW
StretchDIBits
GetWindowOrgEx
GetCharWidth32W
SetWindowExtEx
CreateBitmap
LineTo
Polyline
SetWindowOrgEx
GetTextExtentPoint32A
shlwapi
UrlUnescapeA
StrSpnA
PathMakePrettyW
comctl32
PropertySheetW
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
Exports
Exports
?yjh_l_cyq_ad_@@YGJJJ@Z
?_FWKWP_@@YGXPAKPAF@Z
?nfyaesnU@@YGGI@Z
?IYBCT_kkg@@YGPAGE@Z
?Rbib_izu__oidc@@YGKDPAI@Z
?ZM_M__AUD@@YGEKG@Z
?___m__puAsdk_bhO_QKWC@@YGIPAN@Z
?SUTAZYyCZTF_Yj_dh@@YGJPAHK@Z
?R__O_KKwFZYXH_TIq@@YGJ_N@Z
?t_m__aeaQKDHBSTaoi___W@@YGEPAED@Z
?g_b_jirz_ouzv__ojnM@@YGPAFKF@Z
?k_ohfldeiadj_mfq_@@YGDPAH@Z
?_RQHlz_CBCY_X_KZ_OPJZ@@YGPAEDE@Z
?RSXAOD_CW_@@YGPAXPAJ@Z
?nQ_MGTZovhldlgyj_eAb@@YGXPAJ@Z
?_NE__zjjG_GZrdoe@@YGIG@Z
?dg_deoHngil_@@YGXPAM@Z
Sections
.text Size: 57KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ