G:\OSREWTZ\HSIFYXCO\VSEAUAEG.PDB
Static task
static1
Behavioral task
behavioral1
Sample
febdbd3fe5c3c20fe62b3435abd54a90_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
febdbd3fe5c3c20fe62b3435abd54a90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
febdbd3fe5c3c20fe62b3435abd54a90_JaffaCakes118
-
Size
852KB
-
MD5
febdbd3fe5c3c20fe62b3435abd54a90
-
SHA1
c64fdd273163ab3a549bcc3fa8464ed318c2bb01
-
SHA256
8c7b72d8545558313b198c57511463b4c149bb2fed03c5ff785bdfcae7211538
-
SHA512
c362935659302805a0fe21c8c380f1aef1ffe5b5a2c5d42774ea65ef6454f7920428e4645e4ac558ba8182c9da937b60f1bbc740db79d7a8951957c12878fef0
-
SSDEEP
12288:6/bNgzInsGx98Pw3V9Yvwo35E8sJVov6KHP8yCnBoibQf9w17e9v:6bN6I398P89Yvwl8sJuv6KInKGQfie9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource febdbd3fe5c3c20fe62b3435abd54a90_JaffaCakes118
Files
-
febdbd3fe5c3c20fe62b3435abd54a90_JaffaCakes118.exe windows:4 windows x86 arch:x86
37cf642ee89e9b363e572fd9c8e5cb7a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comdlg32
PageSetupDlgA
GetSaveFileNameW
ChooseColorW
GetSaveFileNameA
comctl32
ImageList_AddMasked
ImageList_GetImageCount
InitCommonControlsEx
ImageList_GetIconSize
user32
IsRectEmpty
FindWindowA
SetWindowPos
RegisterClassExA
wsprintfA
CreateDialogIndirectParamA
GetMenu
GetScrollInfo
CheckDlgButton
GetDlgItemTextA
EnableWindow
LoadCursorA
IsClipboardFormatAvailable
IsMenu
CreateCaret
GetActiveWindow
LockWindowUpdate
DestroyIcon
OffsetRect
GetForegroundWindow
SetWindowsHookExA
ShowWindow
CopyAcceleratorTableA
EndDialog
LoadStringA
AttachThreadInput
GetDlgCtrlID
SetForegroundWindow
DefWindowProcA
LoadBitmapA
BringWindowToTop
GetMenuCheckMarkDimensions
MessageBoxA
GetDC
SendMessageA
DrawTextA
ReleaseCapture
UnhookWindowsHookEx
MoveWindow
DestroyWindow
TrackPopupMenuEx
RegisterClassA
GetWindowTextLengthA
HideCaret
GetSysColor
DrawIcon
GetWindowTextA
InvalidateRect
LoadIconA
CreateWindowExA
GetDesktopWindow
CharNextA
SetCapture
SetWindowTextA
CreatePopupMenu
kernel32
DeleteFileA
TlsSetValue
GetProcAddress
WaitForSingleObject
CompareStringW
LCMapStringW
SetErrorMode
GetDriveTypeA
LocalReAlloc
lstrcmpiA
ReadFile
SystemTimeToFileTime
CopyFileW
GetSystemInfo
GetSystemTime
LoadLibraryW
ResetEvent
MoveFileA
TlsFree
GetEnvironmentStringsW
TlsGetValue
WriteConsoleW
GlobalHandle
GlobalFree
InterlockedCompareExchange
IsBadReadPtr
GetDateFormatA
MulDiv
GetEnvironmentStrings
lstrlenA
WriteConsoleA
UnlockFile
HeapAlloc
GetCurrentThreadId
GetTimeFormatA
IsValidCodePage
DeleteCriticalSection
SizeofResource
GetUserDefaultLCID
GetLocaleInfoA
ResumeThread
HeapDestroy
SetHandleCount
SetCurrentDirectoryA
GetCurrentThread
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
EnumSystemLocalesA
SetFileTime
RtlUnwind
GetCommandLineA
TlsAlloc
SetEvent
ExitProcess
CloseHandle
HeapCreate
GetModuleHandleW
GetCPInfo
FileTimeToLocalFileTime
ExpandEnvironmentStringsA
CreateDirectoryW
FlushFileBuffers
GetUserDefaultLangID
GetLocaleInfoW
GetThreadLocale
GetExitCodeThread
GetExitCodeProcess
SetThreadPriority
GetConsoleMode
GetCurrentProcess
GetTempPathA
VirtualAlloc
CreateEventA
GlobalReAlloc
FormatMessageA
SetStdHandle
GetOEMCP
WideCharToMultiByte
WinExec
LockResource
Sleep
GetModuleFileNameA
LoadResource
IsDebuggerPresent
GetSystemTimeAsFileTime
GetStdHandle
GlobalFlags
FindClose
GetFileTime
GetLastError
IsValidLocale
GetVersion
LCMapStringA
CompareStringA
GlobalAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsW
CreateThread
LocalFree
SetEndOfFile
RaiseException
CreateMutexA
CreateFileA
GetCurrentDirectoryA
lstrlenW
GlobalAddAtomA
GetModuleFileNameW
CreateProcessW
HeapFree
SetFileAttributesW
GetACP
SetUnhandledExceptionFilter
GlobalLock
FreeLibrary
FindNextFileW
DeleteFileW
FindNextFileA
VirtualQuery
GetTickCount
lstrcmpA
GetModuleHandleA
GetVersionExA
lstrcpynA
GetStringTypeA
OutputDebugStringA
LocalAlloc
EnterCriticalSection
GlobalSize
QueryPerformanceCounter
GetTempPathW
GetFileAttributesA
GlobalUnlock
WriteFile
DuplicateHandle
ReleaseMutex
GetFileType
VirtualFree
OpenProcess
HeapReAlloc
SuspendThread
SetEnvironmentVariableA
SetLastError
GetFileSize
LockFile
GetWindowsDirectoryA
HeapSize
SetEnvironmentVariableW
InterlockedExchange
GetLocalTime
GetStringTypeW
GetFileInformationByHandle
FindFirstFileA
GetConsoleOutputCP
MultiByteToWideChar
DeviceIoControl
ExitThread
InterlockedIncrement
lstrcmpW
InterlockedDecrement
GetCurrentProcessId
UnmapViewOfFile
GetStartupInfoA
FreeEnvironmentStringsA
TerminateProcess
SetFilePointer
GetTimeZoneInformation
GetProcessHeap
GetConsoleCP
FileTimeToSystemTime
CopyFileA
ole32
CoTaskMemAlloc
OleRun
OleSetClipboard
OleDuplicateData
CoFreeUnusedLibraries
CreateBindCtx
CoLockObjectExternal
RevokeDragDrop
CLSIDFromString
OleLockRunning
OleIsRunning
CoDisconnectObject
advapi32
GetFileSecurityA
RegCloseKey
RegCreateKeyA
RegSetValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
RegQueryValueA
RegEnumKeyExA
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 470KB - Virtual size: 470KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ