d:\tlomfpxac\ckoftect\onqba.PDB
Static task
static1
Behavioral task
behavioral1
Sample
1233e52c06bbcf9fee68e1c4c71a9140_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1233e52c06bbcf9fee68e1c4c71a9140_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
1233e52c06bbcf9fee68e1c4c71a9140_JaffaCakes118
-
Size
520KB
-
MD5
1233e52c06bbcf9fee68e1c4c71a9140
-
SHA1
10145b1709747618facfed0abeffb0a0dc786b09
-
SHA256
1f1a45f2f5393436f628f3d9a0c2026093f6efb5471520f9b5a4498e78e758ed
-
SHA512
114e854afe927f1c4bddfa11bc7d725cf76edb820ec486508fc65f2cc80ce1090de23f9659ec8a7ad6ec0e2e3e2e3284e4ec5508557238263e59de73a8eee33f
-
SSDEEP
12288:MAnHH2bZE1c8ftfuIKN30qQSxBh+lSgSINtFhFW2xfz:MRV8ftfuIKhi6+Q0NtLFjx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1233e52c06bbcf9fee68e1c4c71a9140_JaffaCakes118
Files
-
1233e52c06bbcf9fee68e1c4c71a9140_JaffaCakes118.exe windows:4 windows x86 arch:x86
91203d362fd1c5a367cd318e2e5c451b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
CreatePropertySheetPageA
ImageList_Destroy
ImageList_GetBkColor
ImageList_DragMove
CreatePropertySheetPageW
InitCommonControlsEx
user32
ChangeMenuA
GetClipboardFormatNameA
PackDDElParam
ShowWindow
RegisterClassExA
EnumDisplayMonitors
DdeClientTransaction
GetScrollInfo
RegisterClassA
EnumClipboardFormats
ModifyMenuW
ChangeClipboardChain
GetCursorPos
GetDialogBaseUnits
DdeQueryStringA
DefWindowProcA
InsertMenuA
OpenWindowStationA
CreateAcceleratorTableW
IsChild
ScrollWindowEx
GetWindowTextLengthW
MessageBoxA
MenuItemFromPoint
SetWindowTextA
SetWindowsHookW
TileChildWindows
CreateWindowExW
DestroyWindow
kernel32
TerminateProcess
CompareStringA
WriteConsoleA
GetPrivateProfileIntW
LCMapStringW
SetConsoleCtrlHandler
GetStringTypeA
GetLocaleInfoW
CreateSemaphoreA
GetConsoleCP
IsValidCodePage
SetLastError
HeapAlloc
ExitProcess
CompareStringW
GetCurrentThread
SetFilePointer
SetStdHandle
GetTimeFormatA
OutputDebugStringW
SetWaitableTimer
EnterCriticalSection
GetProcessHeap
HeapFree
GetUserDefaultLCID
GetStdHandle
OutputDebugStringA
GetCommandLineA
GetSystemTimeAsFileTime
GetModuleHandleA
lstrlenA
GetModuleFileNameW
VirtualAllocEx
QueryPerformanceCounter
HeapReAlloc
RaiseException
GetVersionExA
TlsFree
HeapDestroy
FreeLibrary
SetHandleCount
GetCurrentProcess
OpenMutexA
TlsAlloc
GetCurrentThreadId
IsDebuggerPresent
VirtualQuery
CreateFileA
GetFileAttributesExW
OpenSemaphoreW
WriteConsoleW
GetCommandLineW
CreateMutexA
LCMapStringA
CreateRemoteThread
SetUnhandledExceptionFilter
ReadConsoleW
DebugBreak
LeaveCriticalSection
GetModuleFileNameA
WideCharToMultiByte
InterlockedDecrement
GetFileType
LoadLibraryW
VirtualAlloc
GetConsoleMode
HeapValidate
GetStartupInfoA
IsBadReadPtr
GetConsoleOutputCP
GetDateFormatA
GetCurrentProcessId
GetTickCount
GetTempPathA
GetLocaleInfoA
HeapCreate
GlobalFlags
CreateThread
InterlockedIncrement
LoadLibraryA
IsValidLocale
FileTimeToLocalFileTime
WriteFile
GetACP
GetProcAddress
CloseHandle
InitializeCriticalSection
FreeEnvironmentStringsA
GetLastError
SetEnvironmentVariableA
GetStartupInfoW
VirtualFree
EnumSystemLocalesA
DeleteCriticalSection
InterlockedExchange
UnhandledExceptionFilter
GetOEMCP
CreateMailslotA
RtlUnwind
MultiByteToWideChar
TlsGetValue
TlsSetValue
GetFileAttributesA
LocalShrink
ReadFile
WaitForDebugEvent
GetEnvironmentStrings
FreeEnvironmentStringsW
FlushFileBuffers
GetTimeZoneInformation
GetEnvironmentStringsW
GetCPInfo
GetStringTypeW
Sections
.text Size: 280KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ