wscntfy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0421016822b168111bdca86ae83a08bf_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0421016822b168111bdca86ae83a08bf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0421016822b168111bdca86ae83a08bf_JaffaCakes118
-
Size
33KB
-
MD5
0421016822b168111bdca86ae83a08bf
-
SHA1
fd5e1156b44df8f502208242187032bd3ab762a4
-
SHA256
e31e11da2bea919915a39b42eac34306629acbbe2fa45278b051f108f8381244
-
SHA512
82db96a37f0ca496cea48b4560b288e3a762b73316cf731e2fc4550ac44f7e03be58a54bcd9ce8b0c0e65a6ad53f5554d974350a45e709f11a4d5b005e9518e1
-
SSDEEP
768:Id9eabhxOe3mhb4QsSpfkLLNkA4uevrf0j6oVwp/SQPL:IdYSxmh0T/l+NMmoVS/d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0421016822b168111bdca86ae83a08bf_JaffaCakes118
Files
-
0421016822b168111bdca86ae83a08bf_JaffaCakes118.exe windows:5 windows x86 arch:x86
91ec832ac4951cd03c383d283c59899c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
kernel32
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetUserDefaultUILanguage
GetLocaleInfoW
CreateProcessW
GetProcessHeap
HeapFree
HeapAlloc
LoadLibraryExW
GetStartupInfoW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetLastError
CreateMutexW
CloseHandle
FormatMessageW
CreateEventW
GetCurrentProcessId
user32
PeekMessageW
DispatchMessageW
MsgWaitForMultipleObjects
RegisterWindowMessageW
LoadStringW
LoadImageW
PostQuitMessage
PostMessageW
DestroyMenu
TrackPopupMenu
SetMenuDefaultItem
SetMenuItemInfoW
AppendMenuW
CreatePopupMenu
SetForegroundWindow
GetCursorPos
DefWindowProcW
CreateWindowExW
LoadCursorW
LoadIconW
ShowWindow
RegisterClassExW
shell32
SHGetFolderPathW
ShellExecuteW
Shell_NotifyIconW
rpcrt4
RpcBindingFromStringBindingW
RpcStringBindingComposeW
RpcBindingFree
RpcSsDestroyClientContext
NdrClientCall2
RpcStringFreeW
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE