C:\jagEkesGormwopiweod\MienehjusExpoehgood\Loutqiamapelumhgood\brrkielkDojoumhgood\NeviSildaevegdakood.pdb
Static task
static1
Behavioral task
behavioral1
Sample
086b069333ded5b8aaaa577246ec8725_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
086b069333ded5b8aaaa577246ec8725_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
086b069333ded5b8aaaa577246ec8725_JaffaCakes118
-
Size
174KB
-
MD5
086b069333ded5b8aaaa577246ec8725
-
SHA1
13fdfdcda9ed81e4c78c97bf417063f3bd5601c6
-
SHA256
b6478420c522923bd1594313ec6a5e5e8fa02874d3c0857e0add46ed80b41661
-
SHA512
f1564377517886cba64dd504808ea88ac23b8e7bd57170c678e9597c0e97e9e918e8752fa9ffe165a803e0d1b20d4cec3ce9e883687a25971782221e38c23fe7
-
SSDEEP
3072:p71G/8fil4QRlI1+UrLcjrn8g6szOYgQhksG5zRUVKWdl0XxThtOkuCfm:xsEil4QrI13r48/KpFHG5cK80X5xuCfm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 086b069333ded5b8aaaa577246ec8725_JaffaCakes118
Files
-
086b069333ded5b8aaaa577246ec8725_JaffaCakes118.exe windows:5 windows x86 arch:x86
2ef87b6e2ee9833f3cd424efb044af42
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
RealizePalette
GetDIBColorTable
UnrealizeObject
IntersectClipRect
CreateDIBSection
CreateDCW
SetWindowExtEx
SetRectRgn
SetBkMode
GetObjectA
CreateFontIndirectA
GetTextExtentPoint32A
CreateICW
StartDocW
SetWindowOrgEx
DPtoLP
SetTextColor
GetCharWidth32W
EnumFontFamiliesW
GetDIBits
oleaut32
OleIconToCursor
user32
DefDlgProcA
GetMenuItemRect
RegisterHotKey
CheckDlgButton
ShowWindowAsync
RegisterClassW
TranslateAcceleratorA
EndDialog
SetCaretPos
DrawEdge
CreateDialogParamA
FrameRect
GetUpdateRect
GetDC
DefWindowProcW
ModifyMenuW
WaitForInputIdle
PostThreadMessageA
TranslateMessage
InsertMenuItemW
FindWindowExW
DrawTextA
GetClassLongA
BeginPaint
GetMenuStringA
SendMessageTimeoutW
IsCharAlphaNumericW
GetDialogBaseUnits
SendMessageW
DialogBoxParamW
SetFocus
LoadBitmapW
GetClassInfoExW
InvalidateRgn
CreateDialogParamW
GetDCEx
GetCaretPos
DestroyAcceleratorTable
wvsprintfW
IsCharAlphaW
GetClassNameW
SetMenuDefaultItem
SetSysColors
RedrawWindow
CheckRadioButton
CharToOemW
ShowCursor
SetActiveWindow
TrackPopupMenu
GetAsyncKeyState
DestroyIcon
advapi32
RegDeleteValueA
RegSetValueExW
CryptDestroyKey
RegSetValueExA
NotifyBootConfigStatus
RegCloseKey
kernel32
GlobalReAlloc
SetErrorMode
CompareStringA
lstrcpyA
DuplicateHandle
SetThreadAffinityMask
LoadLibraryW
SetLocalTime
SystemTimeToFileTime
DeleteCriticalSection
SetHandleCount
QueryPerformanceCounter
GetFileType
EnumResourceTypesA
GlobalGetAtomNameW
CreateNamedPipeA
GetLocaleInfoA
GetModuleFileNameA
LocalSize
ClearCommBreak
FindFirstFileA
GetNumberFormatA
Sections
.text Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.psikif Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yid Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pox Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hob Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Kuduag Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.refee Size: 512B - Virtual size: 131B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ