d:\xldiakete\exglzahifl\iixrrxs\oabjeyeu\ttkjsc\eoaoeweo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fb67689402724577f77faf2b14b62b12_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb67689402724577f77faf2b14b62b12_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb67689402724577f77faf2b14b62b12_JaffaCakes118
-
Size
488KB
-
MD5
fb67689402724577f77faf2b14b62b12
-
SHA1
f02a8ce7951a4c834706e6104f28d81115af2e8d
-
SHA256
ecc2a4b77769bb9edf0ec981deba5978655f32bc71fa59e5f2d8024ac9ed516b
-
SHA512
b0897544ebce2b40a44c5d9e3468950a764b6041001c2f502145b6b86b7cab3d2310a08963aba0c5e31270eb535828477475a0f4683bf13475ed07d1c1220cbd
-
SSDEEP
6144:/2dxVK79cgKThMzXqQMOvY8bHptaQwrXcxfdXGxql5L/rf+o7KdE8mqsUb/gpEY5:QvKgThNOvY8bJoQwbcxfdXwq73GxAp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb67689402724577f77faf2b14b62b12_JaffaCakes118
Files
-
fb67689402724577f77faf2b14b62b12_JaffaCakes118.exe windows:4 windows x86 arch:x86
bf77d73bd405717b67a934bc8387fd2b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
advapi32
RegDeleteKeyA
CryptEnumProviderTypesA
RegEnumKeyExA
CryptGenRandom
CryptSetHashParam
RegQueryInfoKeyA
AbortSystemShutdownW
RegSetKeySecurity
RegDeleteValueA
ReportEventA
RegQueryValueExA
RegSaveKeyW
RegQueryValueA
CreateServiceW
RegLoadKeyW
CryptSetProviderA
RegEnumValueA
CryptHashData
RegEnumKeyA
CryptHashSessionKey
shell32
ShellExecuteExA
SHBrowseForFolderA
SHFileOperationW
SHGetSpecialFolderPathW
wininet
InternetShowSecurityInfoByURL
HttpQueryInfoW
HttpSendRequestW
RetrieveUrlCacheEntryFileW
CommitUrlCacheEntryA
InternetFindNextFileA
InternetSetCookieW
kernel32
GetEnvironmentStringsW
SetLastError
EnumSystemLocalesA
CompareStringA
GetTimeFormatA
SetConsoleCtrlHandler
GetConsoleOutputCP
SetThreadContext
GetUserDefaultLCID
DeleteCriticalSection
RtlUnwind
GetLocaleInfoA
GetCurrentThread
Sleep
SetHandleCount
GetConsoleTitleW
TlsFree
VirtualAlloc
TlsSetValue
MultiByteToWideChar
GetStdHandle
IsBadWritePtr
SetStdHandle
GetStringTypeA
LockFileEx
GetCPInfo
SetUnhandledExceptionFilter
WriteConsoleW
FreeEnvironmentStringsW
GetProcessHeap
VirtualQuery
FreeEnvironmentStringsA
GetCurrentProcessId
HeapDestroy
HeapValidate
GetModuleHandleA
GetCurrentProcess
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
GetConsoleMode
FlushFileBuffers
CompareStringW
IsValidCodePage
HeapCreate
IsDebuggerPresent
TlsAlloc
GetEnvironmentStrings
GetSystemInfo
LCMapStringW
ReadFile
EnterCriticalSection
GetPrivateProfileSectionW
HeapSize
GetEnvironmentVariableA
GetNumberFormatW
FreeLibrary
GetModuleFileNameA
LoadLibraryA
InterlockedExchange
DeleteFileA
CloseHandle
GetVersionExA
SetFilePointer
GetStringTypeW
GetTickCount
HeapReAlloc
GetACP
CreateFileA
GetLongPathNameW
UnhandledExceptionFilter
GetOEMCP
QueryPerformanceCounter
TlsGetValue
GetSystemTimeAsFileTime
GetConsoleCP
OpenMutexA
LeaveCriticalSection
GetEnvironmentStringsA
InterlockedDecrement
lstrcatA
TerminateProcess
GetPrivateProfileStructW
WideCharToMultiByte
GetDateFormatA
GetFileSize
LCMapStringA
EnumResourceTypesA
GetLastError
ExitProcess
GetFileType
GetLocaleInfoW
VirtualFree
LoadLibraryW
GetCommandLineA
GetTimeZoneInformation
WriteFile
HeapFree
CreateMutexA
GetStartupInfoA
WriteConsoleA
GetProcAddress
IsValidLocale
InitializeCriticalSection
SetConsoleCursorInfo
SetEnvironmentVariableA
user32
CharLowerA
EndDialog
TrackPopupMenuEx
RegisterClassA
EqualRect
TranslateMDISysAccel
RegisterClassExA
Sections
.text Size: 312KB - Virtual size: 311KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ