C:\TushitPisojoukeilkadx{\affalersmaywotnodiwax{\ebborcsmeyoreoflodebdid.pdb
Static task
static1
Behavioral task
behavioral1
Sample
01abb43968fd8f16d607d7090123ab8b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
01abb43968fd8f16d607d7090123ab8b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
01abb43968fd8f16d607d7090123ab8b_JaffaCakes118
-
Size
195KB
-
MD5
01abb43968fd8f16d607d7090123ab8b
-
SHA1
a016bea1d56cf0ae1ab003114ca02d8344aab812
-
SHA256
d6489adae165330e0ba2353c8c14fae6eb852cfe3760100a6af25680bbb78c74
-
SHA512
759332bbc1867ca626f26d5d77b490c6c46a2c8b5624ca2a1f76a63d30c8ce4095dc6869388f6f07964aaab46b74d89e027a34c10302e5856a375a549513da1c
-
SSDEEP
6144:9rVgoDEnA+B3F9lcluXHFmIRxmshhyPqY:9rV45BlXFmIRxmahyPb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01abb43968fd8f16d607d7090123ab8b_JaffaCakes118
Files
-
01abb43968fd8f16d607d7090123ab8b_JaffaCakes118.exe windows:5 windows x86 arch:x86
1a68c7a1f4032b34c18f42254e8e9546
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
TranslateMessage
AttachThreadInput
ReleaseDC
InvalidateRgn
InSendMessageEx
SetActiveWindow
SetScrollPos
GetClassLongW
SetRectEmpty
GetKeyboardType
TrackPopupMenu
wvsprintfA
CharPrevA
GetKeyState
CallWindowProcW
BringWindowToTop
SetMenu
LoadCursorA
shlwapi
PathIsFileSpecW
gdi32
StartPage
EnumFontFamiliesExW
SetBitmapBits
DeleteObject
GetTextColor
GetFontData
RemoveFontResourceW
kernel32
CreateMutexW
GlobalCompact
EnumResourceLanguagesA
WaitForMultipleObjects
CreateRemoteThread
GetCurrentDirectoryW
GetOverlappedResult
GetNumberFormatW
GetTimeFormatW
TryEnterCriticalSection
Exports
Exports
LoadFileW@4
AddArgumentOld@8
IncrementVersionNew@12
LoadFolderExA@4
GetValueExA@8
Sections
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 191KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE