g:\vugri\gtleoi\pgoevf\wpwh\tmasew.pdb
Static task
static1
Behavioral task
behavioral1
Sample
043e36f8c25b42d7b460a70e0cc53f53_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
043e36f8c25b42d7b460a70e0cc53f53_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
043e36f8c25b42d7b460a70e0cc53f53_JaffaCakes118
-
Size
530KB
-
MD5
043e36f8c25b42d7b460a70e0cc53f53
-
SHA1
b62ffe76cf28aafb226a03b6258a8f1c4a4d6c96
-
SHA256
e43fe58cfd79c8ea9ebfc02fbd04e37e1d2f240aae4ed99965a909b1a3d39841
-
SHA512
7f6a3311e847f48fd2fd4126d245c6e168dee2a7a3fabf25707855a3589bd980a19a136d14538ac9169087e554eecd317ca6b73adf8055bd71e835119379c6bb
-
SSDEEP
12288:OBeZPl8myVOV48mv6ZR0ddwD1TfoSwdgGwmG8Eu89LqVu200Knj:weZ9hIvgR07Qp1OwmG8U9LqVu2mj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 043e36f8c25b42d7b460a70e0cc53f53_JaffaCakes118
Files
-
043e36f8c25b42d7b460a70e0cc53f53_JaffaCakes118.exe windows:4 windows x86 arch:x86
2e9724258308e2710d284c639dc0d1d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetOpenFileNameA
ChooseColorA
LoadAlterBitmap
wininet
InternetQueryOptionW
FindFirstUrlCacheContainerA
HttpQueryInfoA
FtpCommandA
UnlockUrlCacheEntryStream
HttpOpenRequestW
InternetTimeFromSystemTime
comctl32
CreateMappedBitmap
InitMUILanguage
ImageList_Remove
ImageList_SetDragCursorImage
CreateUpDownControl
ImageList_Destroy
ImageList_Read
ImageList_Draw
CreateStatusWindow
InitCommonControlsEx
ImageList_Write
ImageList_Replace
DrawStatusText
gdi32
GetObjectW
SetAbortProc
ScaleWindowExtEx
SetColorSpace
CreateDiscardableBitmap
CreateFontA
DeleteObject
CreateDCA
GetOutlineTextMetricsA
GetDeviceCaps
EnumFontFamiliesW
DeleteDC
user32
EnableWindow
CreateMDIWindowA
SystemParametersInfoA
GetInputState
SetDoubleClickTime
wsprintfW
CreatePopupMenu
SetKeyboardState
CharNextExA
RegisterClassA
ModifyMenuW
EnumClipboardFormats
GetClipboardFormatNameW
VkKeyScanExW
SetClassLongW
RegisterClassExA
GetKeyState
MonitorFromWindow
RegisterDeviceNotificationW
CountClipboardFormats
LoadMenuA
DefFrameProcA
EnableMenuItem
PostMessageA
OemToCharBuffA
shell32
DoEnvironmentSubstA
kernel32
IsBadWritePtr
GetFileType
UnhandledExceptionFilter
GetCurrentThread
GetCPInfo
GetOEMCP
FreeEnvironmentStringsW
SetFilePointer
GetTickCount
GetLocaleInfoW
EnterCriticalSection
VirtualAlloc
QueryPerformanceCounter
MultiByteToWideChar
GetStdHandle
LeaveCriticalSection
OpenEventA
GetCurrentProcess
TerminateThread
GetStringTypeW
GetSystemTimeAsFileTime
CompareStringW
GetTimeFormatA
WideCharToMultiByte
GetEnvironmentStringsW
GetModuleFileNameW
FreeEnvironmentStringsA
TlsAlloc
GetModuleHandleA
HeapCreate
OpenSemaphoreA
GetDateFormatA
CloseHandle
HeapSize
GetStartupInfoW
VirtualProtect
GetTimeZoneInformation
GetCurrentProcessId
IsValidCodePage
GetUserDefaultLCID
DeleteCriticalSection
GetCommandLineA
GetLocaleInfoA
LCMapStringW
TlsSetValue
LCMapStringA
ReadFile
SetHandleCount
ExitProcess
GetSystemInfo
InterlockedExchange
GetStringTypeA
SetLastError
SetEnvironmentVariableA
TlsFree
GetCurrentThreadId
GetEnvironmentStrings
GetStartupInfoA
GetACP
TlsGetValue
WriteFile
GetCommandLineW
CompareStringA
VirtualFree
EnumSystemLocalesA
SetStdHandle
FlushFileBuffers
TerminateProcess
GetProcAddress
GetLastError
RtlUnwind
LoadLibraryA
HeapAlloc
VirtualQuery
OpenMutexA
GetVersionExA
GetModuleFileNameA
HeapFree
HeapReAlloc
InitializeCriticalSection
CreateMutexA
HeapDestroy
IsValidLocale
Sections
.text Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ