e:\wxokopvbua\ztdxge.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ff95a22bc387c941e876bb9f072ed7d5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff95a22bc387c941e876bb9f072ed7d5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff95a22bc387c941e876bb9f072ed7d5_JaffaCakes118
-
Size
351KB
-
MD5
ff95a22bc387c941e876bb9f072ed7d5
-
SHA1
ef009ef28a69540ebd91a1af9835245b2c8b1107
-
SHA256
31ab7275b3b2ece392dfa8ed8160adb63c8e3cde9809c1afe4b532419b57d88b
-
SHA512
50f8046d5582014c4122ee29773182b37861bb68274b7287d1d6d27f6ffb220144b809909b2d6cc6791c22a02eaad77dd50f999481a357e6d387ba2639c882e4
-
SSDEEP
6144:f4N3c4JMf92YIvESqwk7fOOp6joSn7za5yYt1mYA0qvev/S+GzdB1xP:f4NMkMfwYIvESqNOOsBn3a5yYf1Dqg4F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff95a22bc387c941e876bb9f072ed7d5_JaffaCakes118
Files
-
ff95a22bc387c941e876bb9f072ed7d5_JaffaCakes118.exe windows:4 windows x86 arch:x86
8bd5d25fbb8ea2bfa7e2b3a18914d246
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Create
ImageList_EndDrag
InitCommonControlsEx
ImageList_DragLeave
CreateStatusWindowW
ImageList_SetOverlayImage
comdlg32
GetFileTitleA
GetOpenFileNameA
ReplaceTextW
kernel32
HeapSize
GetUserDefaultLCID
LoadLibraryA
IsBadWritePtr
GetTimeZoneInformation
TlsAlloc
GetCurrentThread
IsValidCodePage
GetTimeFormatA
GetFileType
LCMapStringA
FreeEnvironmentStringsW
GetLastError
SetHandleCount
OpenMutexA
GetACP
GetCPInfo
CompareStringW
VirtualQuery
HeapFree
GetLocaleInfoA
UnhandledExceptionFilter
GetModuleFileNameA
IsValidLocale
GetCommandLineA
SetLastError
GetSystemDefaultLangID
ReadFile
InitializeCriticalSection
MultiByteToWideChar
GetDateFormatA
MoveFileW
GetModuleHandleA
EnterCriticalSection
TerminateProcess
CloseHandle
GetStringTypeA
SetEnvironmentVariableA
GetCurrentProcessId
GetTickCount
GetSystemInfo
GetEnvironmentStringsW
TlsFree
FreeEnvironmentStringsA
GetCurrentProcess
TlsSetValue
LeaveCriticalSection
GetStartupInfoA
CreateMutexA
TlsGetValue
QueryPerformanceCounter
FlushFileBuffers
SetStdHandle
RtlUnwind
GetOEMCP
HeapCreate
GetSystemTimeAsFileTime
WideCharToMultiByte
SetFilePointer
WriteFile
SetLocaleInfoA
HeapDestroy
LocalReAlloc
GetProcAddress
LCMapStringW
GetCurrentThreadId
UnlockFile
FindResourceW
GetStdHandle
GetTempPathW
SetSystemTime
VirtualAlloc
VirtualFree
GetVersionExA
WriteProfileSectionW
HeapReAlloc
InterlockedExchange
CommConfigDialogA
HeapAlloc
VirtualProtect
EnumSystemLocalesA
DeleteCriticalSection
RaiseException
ExitProcess
GetLocaleInfoW
GetEnvironmentStrings
ReadFileEx
GetStringTypeW
CompareStringA
GetEnvironmentVariableA
user32
IsCharAlphaA
RegisterClassExA
RegisterClassA
advapi32
RegSaveKeyA
LookupPrivilegeDisplayNameW
LookupAccountNameW
CryptEnumProviderTypesW
RegDeleteKeyA
RegQueryMultipleValuesA
RegQueryValueW
CryptDecrypt
LogonUserW
LookupPrivilegeValueW
CryptVerifySignatureA
CryptGetUserKey
CryptEnumProviderTypesA
CryptDestroyKey
RegConnectRegistryA
LookupAccountNameA
LookupPrivilegeValueA
RegCreateKeyW
RegSetValueExA
RegOpenKeyW
CryptSetProviderExA
StartServiceW
Sections
.text Size: 242KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ