c:\tpe\oof\saypg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ff23243d00b1b6bf5f3102d0d1e798e5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff23243d00b1b6bf5f3102d0d1e798e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff23243d00b1b6bf5f3102d0d1e798e5_JaffaCakes118
-
Size
280KB
-
MD5
ff23243d00b1b6bf5f3102d0d1e798e5
-
SHA1
745e1a508d7b4d529ad7af54606acb044e7d0c15
-
SHA256
75ca62f4df48d188d60785ab9eadd5aceca050ea2fee6516fe7da779400a6753
-
SHA512
b7756fd94b30a029a3fbf6a60866ee7c45e4f171d74ae325b04c0bc4705e88fcc7c4999e0cd8f9c9799e4b50c473716d4a32a492e5b4311c5c4855897797dc76
-
SSDEEP
6144:NteQUifjatbzDZDqhg32KrrRa+w8pJRIkI:NtiRDZmhg3DZe8xI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff23243d00b1b6bf5f3102d0d1e798e5_JaffaCakes118
Files
-
ff23243d00b1b6bf5f3102d0d1e798e5_JaffaCakes118.exe windows:4 windows x86 arch:x86
95a38b874eebb81e6fc6079f4909b1a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
GetWindowExtEx
IntersectClipRect
LPtoDP
GetTextExtentPoint32A
CreateCompatibleBitmap
CopyMetaFileA
BeginPath
SetWindowOrgEx
PatBlt
OffsetRgn
SetViewportExtEx
GetTextAlign
CloseFigure
SelectClipPath
EndPath
SetTextColor
DeleteObject
Pie
UnrealizeObject
SetWindowExtEx
ole32
OleIsCurrentClipboard
CoInitialize
CoGetClassObject
shell32
ShellExecuteA
DragFinish
SHGetSpecialFolderPathA
ord155
SHBrowseForFolderA
DragQueryFileA
kernel32
TerminateProcess
IsDebuggerPresent
GetModuleHandleA
GetDateFormatA
TlsSetValue
GetCurrentProcess
GetProcessHeap
EnterCriticalSection
GetModuleFileNameW
GetModuleFileNameA
SetHandleCount
GetConsoleOutputCP
LCMapStringA
FlushFileBuffers
GetLastError
HeapSize
GetLocaleInfoA
VirtualQuery
GetEnvironmentStrings
RaiseException
GetTimeFormatA
QueryPerformanceCounter
GetStringTypeW
GetStdHandle
CloseHandle
VirtualFree
FreeEnvironmentStringsW
GetCPInfo
TlsFree
HeapReAlloc
MultiByteToWideChar
GetACP
GetModuleHandleW
LCMapStringW
HeapFree
InterlockedDecrement
GetCurrentProcessId
WideCharToMultiByte
DeleteCriticalSection
UnhandledExceptionFilter
GetTimeZoneInformation
ExitProcess
IsValidCodePage
LoadLibraryA
GetOEMCP
GetProcAddress
SetLastError
GetFileType
HeapAlloc
InitializeCriticalSection
GetEnvironmentStringsW
HeapDestroy
GetConsoleMode
LeaveCriticalSection
GetTickCount
RtlUnwind
InterlockedExchange
WriteConsoleA
LoadLibraryW
GetSystemTimeAsFileTime
VirtualAlloc
GetStringTypeA
CreateFileA
TlsGetValue
TlsAlloc
WriteConsoleW
SetUnhandledExceptionFilter
SetFilePointer
GetCommandLineA
GetCurrentThreadId
GetStartupInfoW
GetConsoleCP
CreateMutexW
GetStartupInfoA
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapCreate
GetCommandLineW
GetVersionExA
SetStdHandle
WriteFile
Sleep
ReadFile
InterlockedIncrement
FreeEnvironmentStringsA
user32
DeferWindowPos
UnpackDDElParam
GetClassInfoExW
GetParent
GetActiveWindow
GetSubMenu
SetScrollPos
DrawEdge
RegisterClassExW
GetMenuItemInfoW
CreateDialogIndirectParamW
GetSystemMenu
DestroyWindow
RegisterClassW
OpenClipboard
IsClipboardFormatAvailable
CopyRect
GetSysColorBrush
GetDCEx
CloseClipboard
GetMenu
FillRect
TranslateAcceleratorW
IsZoomed
DrawFocusRect
TranslateMessage
GetMenuStringW
SendDlgItemMessageW
SetScrollInfo
GetMenuItemCount
GetClientRect
EnumChildWindows
SetCursor
IsIconic
GetFocus
ClientToScreen
BeginDeferWindowPos
CreateWindowExW
LoadMenuW
EndDialog
ReleaseCapture
SetTimer
GetForegroundWindow
GetMessagePos
RedrawWindow
RegisterWindowMessageW
SetFocus
DispatchMessageW
GetCursorPos
CharUpperW
ReleaseDC
LoadCursorW
SystemParametersInfoA
SetForegroundWindow
ScrollWindowEx
MessageBeep
IsWindowEnabled
SetWindowPlacement
SetWindowPos
DestroyIcon
EnableMenuItem
GetSystemMetrics
IsWindowVisible
ScreenToClient
GetScrollPos
CallWindowProcW
GetSysColor
MapWindowPoints
GetWindowLongW
GetDoubleClickTime
GetDesktopWindow
DrawFrameControl
GetDlgCtrlID
EndDeferWindowPos
SetRect
LoadBitmapW
GetWindowDC
LoadStringW
GetWindowTextLengthW
DrawIconEx
GetLastActivePopup
MoveWindow
SetMenuItemBitmaps
GetDC
PeekMessageW
LoadIconW
SetActiveWindow
SetMenuDefaultItem
IsRectEmpty
DestroyCursor
UnhookWindowsHookEx
DeleteMenu
InvalidateRect
MessageBoxW
GetWindowThreadProcessId
GetScrollInfo
ShowScrollBar
ModifyMenuW
PtInRect
SetWindowRgn
OffsetRect
SetClipboardData
ShowWindow
RegisterClipboardFormatW
KillTimer
SetDlgItemInt
GetCapture
IsWindow
GetWindow
SetMenu
PostQuitMessage
DefWindowProcW
TrackPopupMenu
GetIconInfo
SetCapture
EqualRect
FrameRect
EndPaint
GetWindowPlacement
InflateRect
EmptyClipboard
CheckMenuItem
BeginPaint
DestroyMenu
UpdateWindow
ScrollWindow
IntersectRect
advapi32
GetSidLengthRequired
RegQueryInfoKeyA
comctl32
ImageList_ReplaceIcon
ImageList_LoadImageA
ImageList_GetIconSize
ImageList_DrawEx
ImageList_EndDrag
ImageList_GetImageInfo
ImageList_AddMasked
DestroyPropertySheetPage
ord17
ImageList_Create
PropertySheetA
InitCommonControlsEx
ImageList_Draw
ImageList_DragMove
ImageList_GetImageCount
ImageList_Destroy
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ