D:\NRGqtEUqm\icjrIxZh\ZbkodUprn\VUobWbzzeg\yophDmoDymcUl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f9a5ecfbef7fe23c1690cdba3f8ce9c2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f9a5ecfbef7fe23c1690cdba3f8ce9c2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f9a5ecfbef7fe23c1690cdba3f8ce9c2_JaffaCakes118
-
Size
195KB
-
MD5
f9a5ecfbef7fe23c1690cdba3f8ce9c2
-
SHA1
ea2a93b86c7fa11274df9112bd0f65378ed59070
-
SHA256
0eed1254b5ac6fc066eb645036a07d4bd387baadb5201bf243e9ee727e4a0c80
-
SHA512
1a320078452a81f7ba9ea953a47b55c4a13b96ca715f5876b95b2489e6a1f5dc93ffb86bb749b589e2f8b68c89ab15b000c51be70c012266b74089f615baf590
-
SSDEEP
6144:56XaptF4GhzRjHBgQvk7OK4H6RVOgcwyQe57:caV1LBgVT8EcjJ57
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f9a5ecfbef7fe23c1690cdba3f8ce9c2_JaffaCakes118
Files
-
f9a5ecfbef7fe23c1690cdba3f8ce9c2_JaffaCakes118.exe windows:5 windows x86 arch:x86
02cf495b4d3a58e978cf5de8a0e75545
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetSaveFileNameW
ChooseFontW
PageSetupDlgW
CommDlgExtendedError
ChooseColorW
gdi32
EndPath
UnrealizeObject
GetTextExtentPoint32W
PtInRegion
CreateHatchBrush
Polyline
EndDoc
SetLayout
ExtTextOutA
SetMapMode
OffsetRgn
CombineRgn
Rectangle
GetTextExtentPointW
EnumFontFamiliesW
SetViewportOrgEx
CreatePolygonRgn
StretchDIBits
ScaleWindowExtEx
DeleteDC
GetTextMetricsW
SetWindowExtEx
SetROP2
GetPixel
GetNearestColor
GetObjectA
GetMapMode
EndPage
Polygon
BeginPath
EnumFontFamiliesExW
SetPixel
GetViewportOrgEx
OffsetViewportOrgEx
CreateBrushIndirect
TranslateCharsetInfo
GetTextColor
GetNearestPaletteIndex
GetWindowOrgEx
GetTextExtentPointA
SaveDC
CreateBitmapIndirect
SetDIBits
StartPage
GetObjectW
GetRgnBox
SetWindowOrgEx
msvcrt
_controlfp
strpbrk
fgetc
clock
isxdigit
iswxdigit
wcscoll
__set_app_type
iswdigit
wcsrchr
strncmp
isspace
mbtowc
strcoll
strtok
tolower
strtol
sprintf
strstr
strtoul
isalnum
__p__fmode
wcsncmp
fgets
__p__commode
_amsg_exit
_initterm
qsort
wcsncpy
_acmdln
fread
exit
_ismbblead
fputs
fwrite
_XcptFilter
strrchr
_exit
_cexit
fflush
strerror
vswprintf
__setusermatherr
strcpy
__getmainargs
user32
GetClassLongA
SendInput
CharLowerA
SetMenu
GetDlgCtrlID
GetDlgItem
GetDialogBaseUnits
TrackPopupMenuEx
SetActiveWindow
wvsprintfW
ScrollWindowEx
InSendMessage
IsWindowVisible
CreateWindowExW
LoadBitmapW
IsDlgButtonChecked
GetClipCursor
DialogBoxParamA
SetRectEmpty
GetMenuStringA
MapVirtualKeyA
InsertMenuA
MapDialogRect
AttachThreadInput
SetForegroundWindow
SetMenuItemBitmaps
GetCursorPos
GetWindowLongA
IsDialogMessageA
EnumThreadWindows
SetScrollInfo
PtInRect
SetDlgItemTextA
CreateAcceleratorTableW
GetDCEx
GetKeyboardLayout
SetScrollPos
SwapMouseButton
MessageBoxA
DefDlgProcW
DefFrameProcW
UnloadKeyboardLayout
DrawMenuBar
RegisterClassA
GetParent
CreateCaret
GetDC
GetSysColorBrush
GetWindow
CheckDlgButton
GetSubMenu
UnionRect
InflateRect
GetWindowPlacement
GetWindowLongW
SetDlgItemInt
GetUserObjectInformationA
GetMenuItemID
CheckMenuRadioItem
GetMenuItemRect
SetWindowLongA
GetWindowDC
SetDlgItemTextW
WindowFromPoint
ActivateKeyboardLayout
OffsetRect
ShowCursor
CreateIconFromResource
ClipCursor
SystemParametersInfoW
DrawEdge
ChildWindowFromPointEx
SendDlgItemMessageA
GetWindowTextW
GetKeyState
ClientToScreen
ChangeMenuW
IsWindow
GetClassInfoExA
IsCharLowerA
CharNextA
HideCaret
ShowCaret
DestroyCaret
OpenDesktopW
GetClassInfoW
LoadIconW
SwitchToThisWindow
RegisterHotKey
CharUpperBuffA
ChildWindowFromPoint
SetSysColors
FindWindowW
FrameRect
SendMessageTimeoutW
InsertMenuW
GetUpdateRgn
CopyImage
DialogBoxIndirectParamW
EnableMenuItem
DrawStateW
CharUpperBuffW
CharToOemW
GetMenuStringW
MapWindowPoints
CharUpperW
GetClassInfoA
CreateCursor
CopyRect
DrawFrameControl
MoveWindow
kernel32
DeleteAtom
SetNamedPipeHandleState
OpenFileMappingA
SetCurrentDirectoryA
InitializeCriticalSection
GetSystemDirectoryA
FindNextFileW
CompareStringA
GetDateFormatA
Sleep
CreateNamedPipeW
OpenFileMappingW
GetFileAttributesA
ConvertDefaultLocale
FormatMessageA
GlobalDeleteAtom
GetThreadContext
CreateNamedPipeA
GetSystemDirectoryW
GetFileAttributesW
SetSystemTimeAdjustment
ResetEvent
HeapAlloc
lstrlenW
WaitCommEvent
OpenFile
DeleteCriticalSection
TransactNamedPipe
WinExec
GetWindowsDirectoryA
SizeofResource
MulDiv
LocalLock
FindNextFileA
lstrcmpW
WaitForMultipleObjects
GetLocaleInfoA
GetCurrentProcess
GetNumberFormatW
RemoveDirectoryA
GetStartupInfoW
GetExitCodeProcess
SuspendThread
FindFirstFileW
GetVersion
SetSystemTime
GetThreadPriority
FindResourceExA
IsDBCSLeadByte
GetModuleFileNameA
CreateFileMappingA
AddAtomA
Exports
Exports
?EnumDirectoryExW@@YGIPAD_NNPAF&U
?IncrementDateNew@@YGXPAIM&U
?GetWindowInfoExW@@YGPAHGD&U
?CancelPointerOld@@YGKPAIIFJ&U
?RtlTimerEx@@YGJPAK&U
?IsNotMediaTypeEx@@YGIEPAMD&U
?EnumEventW@@YGDG&U
?EnumComponentExA@@YGPAKH&U
?InsertKeyNameExW@@YGPAXDPAKPAGG&U
?ValueEx@@YGPAEEGDPAG&U
?ShowWindowExA@@YGHDDD&U
?CopyProviderExW@@YGGJEKPAJ&U
?CancelNameOriginal@@YGPA_NPAGD&U
?RemoveDataOld@@YGHF&U
?CallCharEx@@YGXPAF&U
?CrtDeviceW@@YGPA_NE&U
?CloseValueExA@@YGPAXPAI_NMN&U
?CloseAppName@@YGGPAFG&U
?PutMessageExW@@YGKHIPAI&U
?GetProfileOld@@YGPAEPAHJ&U
?CloseWindowExW@@YGFPAN&U
?CloseEventEx@@YGMPAEPAKPAMF&U
?RemoveVersionEx@@YGDPAGPAEPAG&U
?CrtScreenExW@@YGPAKJPAHPAGD&U
?GetObjectOriginal@@YGPAXDPAEPADN&U
?OnCommandLine@@YGE_N&U
?DeletePathExW@@YGPAIDPAEEF&U
?ShowDateNew@@YGFPAKE&U
?CloseEvent@@YGPAJM&U
?MessageEx@@YGXPAGPAGHN&U
?LoadMemoryExW@@YGPAJINPAK&U
?OnMediaTypeEx@@YGMJPADGPAI&U
?IsNotFolderPathEx@@YGPAXKJ&U
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imp Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.exp Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.byte1 Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.byte0 Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ