d:\sdhjzats.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1778548cf437cf293b0ec9286f5c6d20_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1778548cf437cf293b0ec9286f5c6d20_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1778548cf437cf293b0ec9286f5c6d20_JaffaCakes118
-
Size
684KB
-
MD5
1778548cf437cf293b0ec9286f5c6d20
-
SHA1
4ad1942679c57f4289567b9b48d750694ef06799
-
SHA256
02d47ca1a24d8874cd87b0a9fb30a317f3a2ae177a05650e7e6af435a83efd98
-
SHA512
7aae7bec1c16066a29be6132912c81d63780ec684f4032e307d7ef78b038a81624c2d962dd6e92730bc50e57706c4a8cea0fb2a7ce9a9783b4f3731186f9abeb
-
SSDEEP
12288:CLEFVA0G2xEdqdf/1NFdMMh/H8Sh/Y2H3ZfzjgIPR7mZnOVgk//eVi3:4EFVA0idg/1NFdMMxfzjGBOiCe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1778548cf437cf293b0ec9286f5c6d20_JaffaCakes118
Files
-
1778548cf437cf293b0ec9286f5c6d20_JaffaCakes118.exe windows:4 windows x86 arch:x86
18d34d41d71bcfa2d0b395cc89836a12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
ImageList_LoadImageA
ImageList_GetIcon
CreatePropertySheetPageA
ImageList_SetBkColor
ImageList_Destroy
ImageList_GetImageInfo
ImageList_GetImageCount
ImageList_Create
ord17
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
gdi32
SetBkMode
GetCurrentObject
GetStretchBltMode
ExtTextOutA
CreateBitmapIndirect
CreateCompatibleDC
PlayEnhMetaFile
StrokePath
SetMapperFlags
PolyBezierTo
CreateFontIndirectA
DeleteDC
PolyDraw
StartDocA
SetViewportExtEx
DeleteMetaFile
GetTextFaceA
ExtCreatePen
SetPaletteEntries
CreateRectRgn
OffsetWindowOrgEx
GetNearestPaletteIndex
GetBkColor
CopyMetaFileA
ArcTo
LineTo
PlayMetaFile
FlattenPath
SetAbortProc
Ellipse
StretchDIBits
CreatePatternBrush
OffsetRgn
UpdateColors
AbortDoc
CreateDIBPatternBrushPt
CreateSolidBrush
Arc
GetPixel
FrameRgn
GetBitmapBits
PathToRegion
GetGlyphOutlineA
ScaleWindowExtEx
GetPath
TextOutA
ScaleViewportExtEx
SetTextAlign
RoundRect
SetTextCharacterExtra
SetTextJustification
GetViewportOrgEx
LPtoDP
GetObjectA
GetTextMetricsA
GetNearestColor
GetWindowExtEx
RectInRegion
CreateBrushIndirect
PolyPolyline
GetPolyFillMode
CreateCompatibleBitmap
InvertRgn
CreateEnhMetaFileA
FillRgn
ExtFloodFill
CloseEnhMetaFile
SetPolyFillMode
MoveToEx
SetBoundsRect
CreatePalette
GetRgnBox
SelectObject
SetWindowExtEx
ExtSelectClipRgn
SelectClipRgn
PolyBezier
GetObjectType
CreateICA
CreateDIBitmap
GetViewportExtEx
EqualRgn
SetColorAdjustment
FloodFill
RectVisible
GetClipBox
GetCurrentPositionEx
EnumMetaFile
SetViewportOrgEx
SetBkColor
SetBitmapBits
PlayMetaFileRecord
PtVisible
GetMapMode
kernel32
HeapSize
GetLocaleInfoW
TlsFree
GetStringTypeA
GetCPInfo
SetFilePointer
LCMapStringA
IsValidLocale
GetEnvironmentStrings
ExitProcess
TlsAlloc
HeapFree
GetSystemInfo
SetHandleCount
FlushFileBuffers
SetStdHandle
GetACP
SetEnvironmentVariableA
GetEnvironmentStringsW
MultiByteToWideChar
IsBadWritePtr
GetStdHandle
CompareStringW
VirtualProtect
GetOEMCP
GetCurrentProcessId
HeapDestroy
VirtualQuery
GetCurrentProcess
FreeEnvironmentStringsW
VirtualAlloc
LeaveCriticalSection
HeapAlloc
QueryPerformanceCounter
LoadLibraryA
HeapReAlloc
GetFileType
VirtualFree
LCMapStringW
UnhandledExceptionFilter
ReadFile
GetModuleHandleA
TlsSetValue
GetModuleFileNameA
TerminateProcess
GetStartupInfoA
InitializeCriticalSection
DeleteCriticalSection
GetCurrentThreadId
HeapCreate
CreateMutexA
WriteFile
GetTickCount
GetUserDefaultLCID
TlsGetValue
WideCharToMultiByte
GetTimeZoneInformation
GetCommandLineA
GetVersionExA
CompareStringA
GetCurrentThread
GetProcAddress
GetLastError
EnumSystemLocalesA
GetSystemTimeAsFileTime
GetTimeFormatA
IsValidCodePage
CloseHandle
GetDateFormatA
GetStringTypeW
EnterCriticalSection
SetLastError
FatalAppExitA
RtlUnwind
GetLocaleInfoA
InterlockedExchange
FreeEnvironmentStringsA
wininet
InternetOpenA
InternetReadFile
InternetQueryDataAvailable
InternetCrackUrlA
InternetSetFilePointer
HttpOpenRequestA
InternetCanonicalizeUrlA
HttpQueryInfoA
shell32
ord155
SHEmptyRecycleBinA
ShellExecuteExA
user32
GetPropA
DispatchMessageA
GetParent
FrameRect
ClientToScreen
DefWindowProcA
TrackPopupMenu
GetSysColor
SetPropA
IsChild
SetTimer
FillRect
InflateRect
RegisterClassA
GetClassLongA
OpenClipboard
DestroyIcon
SetCapture
EnableWindow
GetDlgCtrlID
FindWindowA
MapDialogRect
IsWindowVisible
GetCapture
SetWindowTextA
GetDlgItem
SetWindowsHookExA
IsDlgButtonChecked
AttachThreadInput
InvalidateRect
DrawTextA
CopyRect
AdjustWindowRectEx
RegisterClassExA
SetWindowLongA
SetWindowPos
SetClipboardData
IsWindow
LoadImageA
GetFocus
MessageBoxA
GetMenuItemID
GetKeyboardState
CreateWindowExA
GetClipboardData
GetMenuState
ScreenToClient
DestroyWindow
ShowWindow
GetActiveWindow
ShowOwnedPopups
SetWindowContextHelpId
BringWindowToTop
CheckMenuItem
GetIconInfo
PeekMessageA
AppendMenuA
GetDC
GrayStringA
LoadMenuA
SetRectEmpty
DeferWindowPos
GetMessagePos
ReleaseCapture
GetUpdateRect
UnregisterClassA
GetMenu
UnhookWindowsHookEx
GetDesktopWindow
CallWindowProcA
GetClassInfoA
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 452KB - Virtual size: 449KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ