c:\mdhka.PDB
Static task
static1
Behavioral task
behavioral1
Sample
0111fd16fe79deed385ff880edb04084_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0111fd16fe79deed385ff880edb04084_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0111fd16fe79deed385ff880edb04084_JaffaCakes118
-
Size
504KB
-
MD5
0111fd16fe79deed385ff880edb04084
-
SHA1
7296f39e0522b601ab30ab5dd70d37c49e53699f
-
SHA256
edad92719d3e91d265c1dd5a9060cd44d3d4b35ba01ea0099487645f77c28df0
-
SHA512
4c9763fdf92ff13ec80235b8e8905440efb68fdaca64178e0c19dc7764043967c23d96cc330696593bd7348150c0a55ace7c9612cb3e00a47fd3f19501810420
-
SSDEEP
6144:9pVOK5Nr1Hzq7xJA5eNGY7R0ZRSG0cC3H2OZ7jm1sMh64CJb5Bq6pjFHaCEGF+pn:9r7kfT7RLGNXi7ssUYt5Tj9TEGoPPU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0111fd16fe79deed385ff880edb04084_JaffaCakes118
Files
-
0111fd16fe79deed385ff880edb04084_JaffaCakes118.exe windows:4 windows x86 arch:x86
609d31b9122c5d8d035a13998794f060
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
CascadeWindows
CharNextW
ChildWindowFromPointEx
SendNotifyMessageA
UnhookWindowsHookEx
EndMenu
RegisterClassA
IsCharLowerA
GetMenuDefaultItem
ShowCaret
AdjustWindowRectEx
SetThreadDesktop
EnableScrollBar
UnionRect
SetWindowsHookExW
AppendMenuA
RegisterWindowMessageA
RegisterClassExA
SetWindowPos
LoadCursorFromFileW
GetMenuItemInfoA
LoadAcceleratorsW
kernel32
IsValidCodePage
MultiByteToWideChar
SetHandleCount
HeapFree
DeleteCriticalSection
GetStdHandle
SetStdHandle
GetEnvironmentStrings
TlsFree
ExitProcess
CompareStringA
VirtualFree
LCMapStringA
ReadFile
GetLastError
VirtualQuery
TlsAlloc
GetConsoleCP
HeapCreate
HeapSize
LeaveCriticalSection
TlsSetValue
WriteConsoleW
WriteConsoleA
SetCurrentDirectoryW
InterlockedExchange
GetProfileIntW
GetModuleHandleA
GetStringTypeA
GetModuleFileNameA
GetCurrencyFormatW
IsDebuggerPresent
GetCurrentProcessId
SetConsoleCtrlHandler
ResumeThread
GetVersionExA
FreeEnvironmentStringsW
GetProcessHeap
SetConsoleCursorInfo
RtlUnwind
IsValidLocale
LoadLibraryA
InterlockedDecrement
UnhandledExceptionFilter
HeapDestroy
EnumSystemLocalesA
GetStringTypeW
HeapReAlloc
FlushFileBuffers
WriteFile
GetCPInfo
GetCurrentThreadId
GetLocaleInfoA
GetTimeZoneInformation
CloseHandle
SetFilePointer
GlobalSize
CreateFileA
GetOEMCP
OutputDebugStringA
GetLocaleInfoW
TerminateProcess
OpenMutexA
FreeLibrary
GetACP
CompareStringW
QueryPerformanceCounter
VirtualAlloc
SetEnvironmentVariableA
Sleep
GetTempPathA
TlsGetValue
CreateMutexA
GetCommandLineA
GetConsoleOutputCP
FreeEnvironmentStringsA
SetFileTime
LCMapStringW
GetCurrentThread
GetUserDefaultLCID
GetProcAddress
GetTimeFormatA
HeapAlloc
GetEnvironmentStringsW
GetDateFormatA
InitializeCriticalSection
GetStartupInfoA
EnterCriticalSection
GetFileType
GetCurrentProcess
GetConsoleMode
EnumResourceNamesW
SetThreadIdealProcessor
SetUnhandledExceptionFilter
GetTickCount
SetLastError
InterlockedIncrement
WideCharToMultiByte
GetSystemTimeAsFileTime
wininet
GopherOpenFileA
FindNextUrlCacheGroup
HttpSendRequestExW
InternetCheckConnectionA
IsHostInProxyBypassList
shell32
SHGetPathFromIDList
comctl32
InitCommonControlsEx
comdlg32
PageSetupDlgW
Sections
.text Size: 350KB - Virtual size: 350KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ