E:\tszfXfo\jRhjoklgtTvol\bzhRJwhbKpcMf\efdEmajvyna.pdb
Static task
static1
Behavioral task
behavioral1
Sample
03837adf9dd27c89a61781e48cc62845_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
03837adf9dd27c89a61781e48cc62845_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
03837adf9dd27c89a61781e48cc62845_JaffaCakes118
-
Size
146KB
-
MD5
03837adf9dd27c89a61781e48cc62845
-
SHA1
7a15f1b9f35231347998cd3d21801afcbff8f612
-
SHA256
ec673c7c6deb5b1ad2f098dd414597890db15a4e8f912ceba00d7c3ade8c6d6b
-
SHA512
02022c8c8a9a5eb765dbd655d727d56e599955b4720a6f59667f9ffbf3c64ded826438e06080cbd407eba1db4a21d7274fe63b5339d4ce6dbde8d606086221d7
-
SSDEEP
3072:NzrQZV067hKC/sEJMMF76aZevm2RM+3gLQkymX65vJfzV3jrIuttecA:N/80MbES5F7uvm2mogLQkf613jrIGYz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03837adf9dd27c89a61781e48cc62845_JaffaCakes118
Files
-
03837adf9dd27c89a61781e48cc62845_JaffaCakes118.exe windows:5 windows x86 arch:x86
ecb1d5427d5dc9ab8b5e36039d4f0549
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
fflush
fputs
wcsncpy
wcscspn
iswprint
fputc
__set_app_type
memset
wcstod
gmtime
__p__fmode
strpbrk
wcstol
isxdigit
fread
__p__commode
towlower
strncmp
setlocale
_amsg_exit
_initterm
_ismbblead
localtime
wcsncmp
isupper
iswalpha
putchar
mktime
strstr
_XcptFilter
wcspbrk
atoi
fprintf
fgets
isalpha
puts
strcpy
iswspace
_exit
_cexit
__setusermatherr
__getmainargs
iswdigit
wcscat
sscanf
sprintf
printf
user32
DrawTextA
TrackPopupMenu
ValidateRect
MessageBoxExW
GetKeyboardType
SetLastErrorEx
GetIconInfo
ShowCaret
GetScrollPos
DialogBoxIndirectParamA
GetClipCursor
SetMenu
IsDialogMessageA
CharUpperBuffW
GetFocus
DestroyWindow
CharNextA
GetAsyncKeyState
LoadImageA
InvalidateRect
KillTimer
TabbedTextOutW
CharUpperA
MoveWindow
InflateRect
DialogBoxIndirectParamW
CharLowerBuffW
DrawAnimatedRects
CreateIconFromResource
GetDoubleClickTime
InternalGetWindowText
GetUserObjectInformationW
GetWindowLongA
IsCharAlphaNumericW
BringWindowToTop
GetWindowTextLengthW
OemToCharBuffA
SwitchToThisWindow
GetActiveWindow
OpenIcon
CheckDlgButton
LoadMenuA
CheckRadioButton
mouse_event
SetScrollInfo
CreateWindowExW
GetWindowModuleFileNameW
GetKeyState
SetDlgItemInt
SetWindowLongA
GetMenuStringA
GetClassNameW
TranslateAcceleratorW
GetWindowRect
InsertMenuA
IsMenu
GetDlgItemTextW
HiliteMenuItem
DrawStateA
GetPropW
TrackPopupMenuEx
LoadStringW
GetMessageA
GetDlgItemInt
MapVirtualKeyW
PostMessageA
DrawMenuBar
RegisterWindowMessageW
SetForegroundWindow
GetDialogBaseUnits
ChildWindowFromPointEx
GetWindowTextW
FindWindowExA
CharNextExA
wsprintfW
SetFocus
CreateIconIndirect
EnableWindow
DialogBoxParamA
RemovePropW
SendMessageA
ReplyMessage
ShowScrollBar
UpdateWindow
GetGUIThreadInfo
TranslateMessage
SendMessageW
LoadCursorA
OpenInputDesktop
GetMessageTime
PostThreadMessageW
GetSysColorBrush
CopyImage
GetSystemMenu
RegisterClassExW
SendDlgItemMessageA
DestroyAcceleratorTable
SetWindowTextW
GrayStringW
RegisterWindowMessageA
SetClassLongW
SendDlgItemMessageW
LockWindowUpdate
CloseDesktop
GetShellWindow
GetCaretBlinkTime
CopyAcceleratorTableW
UnloadKeyboardLayout
GetScrollRange
VkKeyScanW
GetMenuState
CreateAcceleratorTableW
GetParent
SetPropW
GetWindow
FindWindowW
EnableMenuItem
DestroyIcon
GetDlgCtrlID
CopyRect
AppendMenuA
GetTopWindow
DrawTextExW
AdjustWindowRectEx
CharNextW
CallWindowProcW
shlwapi
StrToIntW
kernel32
TlsFree
IsBadStringPtrW
MapViewOfFile
HeapUnlock
GetFileAttributesW
IsBadWritePtr
SetMailslotInfo
GetDateFormatW
lstrcpynW
GetVersionExW
GetModuleHandleA
GlobalAddAtomW
CreateNamedPipeA
GetOverlappedResult
FreeLibrary
SetThreadPriority
TransactNamedPipe
GetSystemWindowsDirectoryA
GetModuleFileNameW
WaitForSingleObject
CopyFileA
CreateNamedPipeW
HeapFree
IsDBCSLeadByte
GetFullPathNameW
SetFilePointer
GlobalUnlock
WaitForSingleObjectEx
GetLocaleInfoA
ClearCommError
SetEvent
SetFileTime
GetModuleHandleW
GetProcessHeap
HeapAlloc
WaitForMultipleObjects
GetComputerNameExW
SetCommBreak
GetVersion
GetSystemDirectoryA
SetUnhandledExceptionFilter
SystemTimeToFileTime
IsBadCodePtr
TerminateThread
FindNextFileA
EnumResourceTypesA
VerSetConditionMask
OpenFileMappingW
GlobalLock
OpenFileMappingA
LocalAlloc
GetCurrentThreadId
IsValidLocale
GetOEMCP
GetSystemWindowsDirectoryW
EnumResourceLanguagesA
CreateWaitableTimerA
GetCommandLineA
comdlg32
PrintDlgExW
ReplaceTextW
GetFileTitleW
GetOpenFileNameA
FindTextW
Exports
Exports
?GenericOutputInfoYSUh@@YGK_KHE[D
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ