M:\xeofoei\ntwcjqOxEzf\ulxWmQdxgv\gqIgggzyWxe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fd7608cb6a6f04fb6931faa3aa0aaa3d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd7608cb6a6f04fb6931faa3aa0aaa3d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd7608cb6a6f04fb6931faa3aa0aaa3d_JaffaCakes118
-
Size
221KB
-
MD5
fd7608cb6a6f04fb6931faa3aa0aaa3d
-
SHA1
e0bfaf18640f465c53fbdfc4969f3ff3a64be2e8
-
SHA256
500e595edffbac5e1f1b6a5496791ee5b6f814932c9918c54e518008869db1aa
-
SHA512
711d8be9c351ba95b9450d8cf976609b5eebe561b924db68ba40759e61179d5563017003c6aebca1beefd3a02afe5a3ec7eb548a394facca755812ae12fc2456
-
SSDEEP
6144:pqVO493GEGYt7f1MCyDcbdyDwuwS2UgdYxH:03LGYt7f12DmUEuw7dYxH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd7608cb6a6f04fb6931faa3aa0aaa3d_JaffaCakes118
Files
-
fd7608cb6a6f04fb6931faa3aa0aaa3d_JaffaCakes118.exe windows:5 windows x86 arch:x86
1192133c13d2a70cf3a5271c4a3a96c8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ole32
GetConvertStg
advapi32
GetSecurityDescriptorDacl
AddAccessDeniedAce
version
VerQueryValueW
msvcrt
memcpy
kernel32
HeapWalk
MoveFileA
CreateMailslotW
GlobalFindAtomA
ReleaseSemaphore
CreateRemoteThread
SetFilePointer
GetTempPathA
CopyFileA
GetNumberFormatA
DeleteFileA
PulseEvent
GetLocaleInfoA
CompareFileTime
FileTimeToDosDateTime
EnumSystemLocalesA
IsValidLanguageGroup
GetSystemWindowsDirectoryW
SetEndOfFile
user32
LoadBitmapW
LoadCursorW
FindWindowA
OffsetRect
CheckMenuItem
GetScrollPos
GetDlgCtrlID
CharUpperA
IsDlgButtonChecked
GetSysColor
DrawIcon
GetDialogBaseUnits
LoadBitmapA
SetForegroundWindow
MessageBoxA
MoveWindow
SetCaretPos
CreatePopupMenu
SendMessageTimeoutA
CharUpperBuffW
GetForegroundWindow
DialogBoxIndirectParamW
EnableMenuItem
GetWindowRect
SetWindowPos
GetAltTabInfoW
GetDoubleClickTime
CheckMenuRadioItem
PeekMessageA
SetWindowRgn
InSendMessageEx
SendMessageA
IsMenu
GetDlgItemTextW
ShowWindowAsync
GetKeyboardLayout
gdi32
CreateBitmapIndirect
TextOutA
CreateBrushIndirect
DPtoLP
CreatePalette
CreateFontIndirectA
Ellipse
SetBitmapBits
GetWindowOrgEx
StretchBlt
RealizePalette
CreateDIBSection
OffsetViewportOrgEx
UnrealizeObject
RoundRect
GetMapMode
EnumFontFamiliesW
Exports
Exports
?SDOisioKJS@@YGKEPA_WG@Z
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dat_0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dat_2 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_3 Size: 1024B - Virtual size: 619B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_4 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 512B - Virtual size: 102B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ