O:\hyxLNkcsORth\tHBeKIzbesfpi\tUnvgzYm\EkvsxrioTjcGvu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
105a0e0afed40cada7daf451318deb5d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
105a0e0afed40cada7daf451318deb5d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
105a0e0afed40cada7daf451318deb5d_JaffaCakes118
-
Size
166KB
-
MD5
105a0e0afed40cada7daf451318deb5d
-
SHA1
233ad9da5b361d258755c5d2f5897601bd40f66c
-
SHA256
bc9296ecf07932e8427ca687c36c74deeb5accaad070fef49890d07c3acf9770
-
SHA512
df66e96e083e1c6babf7fe3da09b2451e83a77eca00e039cb0cc2fe489adfe3360f03289d34070e569b1738946b87a763d0b41460a3e508f884731fa9a2195c5
-
SSDEEP
3072:M63tjj8ur1qcZl2rn5auc563D+0sRyLET+rLjErYaRdZA:ZGuwcXmOkK0wyLESHja
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 105a0e0afed40cada7daf451318deb5d_JaffaCakes118
Files
-
105a0e0afed40cada7daf451318deb5d_JaffaCakes118.exe windows:5 windows x86 arch:x86
7c46a74b13e5274c2113650d3d8112e4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
wcsstr
_controlfp
__set_app_type
__p__fmode
__p__commode
strcoll
iswprint
_amsg_exit
_initterm
_ismbblead
_XcptFilter
_exit
_cexit
__setusermatherr
__getmainargs
memset
kernel32
GetModuleFileNameA
MoveFileW
GetTempFileNameA
LoadLibraryA
GetVersionExA
lstrcmpiW
LoadLibraryExA
lstrlenA
DeleteFileW
user32
FindWindowW
DestroyAcceleratorTable
SetMenuDefaultItem
SetScrollPos
wsprintfW
ClientToScreen
DrawFrameControl
GetDC
shlwapi
UrlGetLocationW
ChrCmpIW
gdi32
SetWindowOrgEx
GetDIBColorTable
RectInRegion
CreateHalftonePalette
CreateBrushIndirect
GetMapMode
Exports
Exports
?CreateDlgMessage@@YGHPAXPADK|U
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idir Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 136KB - Virtual size: 394KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE