f:\ntqexts.PDB
Static task
static1
Behavioral task
behavioral1
Sample
1540b8cc3b0c0f1002b7b291f5eb6090_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1540b8cc3b0c0f1002b7b291f5eb6090_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1540b8cc3b0c0f1002b7b291f5eb6090_JaffaCakes118
-
Size
736KB
-
MD5
1540b8cc3b0c0f1002b7b291f5eb6090
-
SHA1
70c2c0df2a30079ff7381df5c2c9de6e1a825253
-
SHA256
1753ac1eba52cbe5163a56b37be3c97a91d431e37a0f5d22c683bad2f6bfa1b7
-
SHA512
fb941d0a83208f2d160a0a7c2d40c3ba852d5c3d65e133f056afe23f49e6fa349ce7248dfe9f9eac8acc365e31da658fa46476458fc59d8d91425d6f332af3e0
-
SSDEEP
12288:Ync7vLwylk5TZx0Z/t5DHuX5AvtYhoSiOGB5/cuwwg7QWV7P+ONgH4N6:Yc/F+9ZeFTbvyRiOGn/cHDdKugYN6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1540b8cc3b0c0f1002b7b291f5eb6090_JaffaCakes118
Files
-
1540b8cc3b0c0f1002b7b291f5eb6090_JaffaCakes118.exe windows:4 windows x86 arch:x86
3da78d4a60731866914fc359845f4e84
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegOpenKeyA
RegEnumKeyExA
RegCreateKeyExA
CryptDestroyHash
OpenServiceA
RegSetValueExA
InitializeSecurityDescriptor
RegEnumKeyA
RegQueryValueA
CryptCreateHash
OpenSCManagerA
CryptAcquireContextA
RegDeleteKeyA
RegSetValueA
CryptHashData
RegEnumValueA
CloseServiceHandle
GetUserNameA
SetFileSecurityA
CryptReleaseContext
RegQueryValueExA
RegCreateKeyA
RegQueryInfoKeyA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
winspool.drv
ord204
OpenPrinterA
GetPrinterA
ClosePrinter
SetPrinterA
DocumentPropertiesA
oleaut32
LoadTypeLi
shell32
ord155
SHGetMalloc
DragQueryFileA
ExtractIconA
user32
GetClassNameW
RedrawWindow
DrawMenuBar
GetFocus
GetWindowRect
InvalidateRgn
CallWindowProcW
GetClassInfoExW
GetWindowPlacement
IsWindow
RegisterClassExW
GetAsyncKeyState
GetMessagePos
SetScrollPos
IsWindowEnabled
SetWindowPos
GetMenu
GetMenuDefaultItem
ShowWindow
CreatePopupMenu
SetDlgItemInt
GetCursorPos
PostMessageW
FindWindowW
RegisterClassW
TranslateAcceleratorW
ReuseDDElParam
IsWindowVisible
DeferWindowPos
IsMenu
SystemParametersInfoA
UnhookWindowsHookEx
ReleaseCapture
DestroyIcon
DestroyMenu
DestroyCursor
GetLastActivePopup
GetMessageW
GetDlgItemInt
gdi32
AngleArc
PlayMetaFileRecord
DPtoLP
CreateHalftonePalette
CreateBitmapIndirect
ArcTo
SetMapperFlags
CreateDIBPatternBrushPt
GetObjectA
FillRgn
CreateBitmap
AbortDoc
EnumMetaFile
GetViewportExtEx
AbortPath
WidenPath
GetTextMetricsA
SetMapMode
GetStockObject
CreatePalette
PolyBezier
MoveToEx
GetCharABCWidthsFloatA
SetWindowOrgEx
AnimatePalette
GetRgnBox
MaskBlt
SaveDC
GetColorAdjustment
LPtoDP
GetKerningPairsA
SetROP2
GetStretchBltMode
SetMiterLimit
CreateFontA
GetCharWidthFloatA
SetColorAdjustment
CreateDCA
RestoreDC
EnumObjects
GetMiterLimit
CreateCompatibleDC
DrawEscape
GetTextFaceA
SelectPalette
GetNearestPaletteIndex
SetBoundsRect
CreateDiscardableBitmap
GetNearestColor
ExtEscape
GetArcDirection
CreatePolyPolygonRgn
PlgBlt
SetTextCharacterExtra
Polyline
ExtFloodFill
GdiComment
BitBlt
GetAspectRatioFilterEx
PolyDraw
StretchDIBits
GetPolyFillMode
GetDCOrgEx
SelectObject
GetBrushOrgEx
CreateSolidBrush
comctl32
DestroyPropertySheetPage
InitCommonControlsEx
shlwapi
PathAddBackslashA
PathAppendA
PathFindExtensionA
mfc42
ord1576
kernel32
GetProcAddress
HeapFree
IsBadWritePtr
GetModuleFileNameA
GetStdHandle
InitializeCriticalSection
InterlockedExchange
FreeEnvironmentStringsA
InterlockedIncrement
GetTickCount
GetCommandLineW
GetCurrentProcess
VirtualQuery
FatalAppExitA
SetHandleCount
HeapReAlloc
VirtualAlloc
TerminateProcess
GetStringTypeW
GetCommandLineA
WideCharToMultiByte
GetCPInfo
HeapCreate
SetStdHandle
LCMapStringA
GetLastError
SetFilePointer
GetCurrentThread
GetVersion
HeapAlloc
GetEnvironmentStrings
CompareStringA
ReadFile
LCMapStringW
GetCurrentThreadId
GetModuleFileNameW
HeapDestroy
FlushFileBuffers
InterlockedDecrement
LoadLibraryA
GetStartupInfoW
GetLocalTime
RtlUnwind
TlsFree
GetFileType
MultiByteToWideChar
GetTimeZoneInformation
QueryPerformanceCounter
TlsSetValue
UnhandledExceptionFilter
CreateMutexW
GetModuleHandleW
GetSystemTime
SetEnvironmentVariableA
CloseHandle
WriteFile
GetEnvironmentStringsW
CompareStringW
GetModuleHandleA
TlsGetValue
DeleteCriticalSection
EnterCriticalSection
SetLastError
LeaveCriticalSection
GetStringTypeA
ExitProcess
GetSystemTimeAsFileTime
GetStartupInfoA
GetCurrentProcessId
FreeEnvironmentStringsW
VirtualFree
TlsAlloc
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448KB - Virtual size: 446KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ