e:\coueaybec\oaysfvkw\qehrh\exeh\gawel\iahegee.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ff719a2793aea935313e1a0d65da7b87_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff719a2793aea935313e1a0d65da7b87_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff719a2793aea935313e1a0d65da7b87_JaffaCakes118
-
Size
672KB
-
MD5
ff719a2793aea935313e1a0d65da7b87
-
SHA1
1f2873db4861ba821ea947f4909f1aa76cec9519
-
SHA256
192e7d56ef9dd7b91689c4e4a8f35fcea3162a5c9f2e9a4f11f09a92c38d4ef9
-
SHA512
93dc10132b20cc66687aa1cdba4540314a1bd03b61a51626a12d855e1d2d3e99f778c7a2be7de6676994e23baf9cfe2e706173f918cf46eb173ffcc28a923246
-
SSDEEP
12288:tFCowR1HwYrEEpsC7+8Uyh4F2OgqKQ0nAmvovDMAvKJ9rK0HGGYS9luGABoSQq+Z:tFCn1HPEEphFqF2Zlows0H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff719a2793aea935313e1a0d65da7b87_JaffaCakes118
Files
-
ff719a2793aea935313e1a0d65da7b87_JaffaCakes118.exe windows:4 windows x86 arch:x86
0fdaadc637e618e05249a7df72af8f42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
LoadBitmapA
ShowWindow
MonitorFromWindow
DrawEdge
LoadMenuIndirectW
TrackMouseEvent
BeginPaint
DrawIcon
RegisterClassExA
GetWindowModuleFileNameW
MapVirtualKeyExW
DlgDirListA
RegisterHotKey
DefWindowProcW
SendMessageW
LoadImageA
LoadAcceleratorsA
DefFrameProcW
IsZoomed
CreateWindowExW
EnumDisplaySettingsExW
GetClassLongW
EndDeferWindowPos
RegisterClassExW
LookupIconIdFromDirectory
SendIMEMessageExW
CharLowerBuffW
ModifyMenuW
ToAscii
GetWindowWord
LookupIconIdFromDirectoryEx
DdeInitializeA
ToUnicodeEx
DestroyCursor
IntersectRect
MessageBoxA
DestroyWindow
RegisterClassA
shell32
ShellAboutW
SHGetNewLinkInfo
ShellHookProc
comctl32
ImageList_GetIconSize
CreateUpDownControl
CreateToolbarEx
DrawStatusTextA
ImageList_Draw
CreateStatusWindow
InitCommonControlsEx
ImageList_GetDragImage
ImageList_Read
ImageList_DragEnter
ImageList_EndDrag
CreateStatusWindowW
DrawStatusTextW
ImageList_AddMasked
ImageList_SetOverlayImage
ImageList_Destroy
CreateToolbar
DestroyPropertySheetPage
kernel32
CreateMutexA
TerminateProcess
InterlockedDecrement
GetStringTypeA
GetCurrentThread
GetModuleFileNameA
SetConsoleMode
SetStdHandle
WideCharToMultiByte
GetStartupInfoA
GetProcAddress
FlushFileBuffers
GetPriorityClass
CompareStringW
CompareStringA
MoveFileExW
WriteFile
GetCurrentProcessId
QueryPerformanceCounter
GetNumberFormatW
LeaveCriticalSection
TlsFree
CloseHandle
ReadFile
LCMapStringW
TlsAlloc
FreeEnvironmentStringsW
GetModuleHandleA
IsBadWritePtr
HeapCreate
UnlockFileEx
TlsSetValue
GetSystemTime
OpenMutexA
GetThreadPriority
GetCommandLineA
LoadLibraryA
VirtualFree
GetCurrentProcess
GetOEMCP
SetLastError
ExitProcess
ReadConsoleInputA
RtlUnwind
InitializeCriticalSection
GetVersion
GetACP
GetSystemTimeAsFileTime
GetLastError
EnterCriticalSection
GetEnvironmentVariableA
HeapAlloc
DeleteCriticalSection
SetFilePointer
VirtualQuery
GetLocalTime
GetCurrentThreadId
GetEnvironmentStrings
GetTickCount
GetFileType
SetEnvironmentVariableA
HeapReAlloc
TlsGetValue
SetHandleCount
UnhandledExceptionFilter
FreeEnvironmentStringsA
VirtualAlloc
LCMapStringA
GetStringTypeW
InterlockedExchange
GetTimeZoneInformation
GetCPInfo
CreateToolhelp32Snapshot
GetEnvironmentStringsW
InterlockedIncrement
HeapFree
GetStdHandle
OutputDebugStringA
MultiByteToWideChar
HeapDestroy
Sections
.text Size: 228KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ