e:\tmsjdln\brgosg\wxjjlucnjg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2da469c0d584600284bb0a61ffd534a2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2da469c0d584600284bb0a61ffd534a2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2da469c0d584600284bb0a61ffd534a2_JaffaCakes118
-
Size
496KB
-
MD5
2da469c0d584600284bb0a61ffd534a2
-
SHA1
cbc354748fd63254f4c2bcb0e558d4ac5e010fde
-
SHA256
5f33e75b21e0204751be6714766a8152f5d467606f1df10feda103a6ece20fc0
-
SHA512
45c5d383f5e0b96ad66e070859ddc8dd1495fa4c4461cc35c5014164952091569bce69a95e01d256f82a1b6042c390c51704e6944292010882143badefab29e9
-
SSDEEP
12288:QgZRFGRFfcbLy1V6npw7SIuvQToEQVyykgvyI:QRFiLlpw7mYTVQryI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2da469c0d584600284bb0a61ffd534a2_JaffaCakes118
Files
-
2da469c0d584600284bb0a61ffd534a2_JaffaCakes118.exe windows:4 windows x86 arch:x86
91974b3a43a8e16e4c62bb7a38c27aa1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
ord155
SHFileOperationW
SHGetDesktopFolder
SHAppBarMessage
winmm
waveInGetNumDevs
waveOutOpen
user32
SystemParametersInfoW
BringWindowToTop
GetParent
DeferWindowPos
DeleteMenu
GetFocus
IsChild
DestroyWindow
DrawTextW
CallWindowProcW
PeekMessageW
GetSysColorBrush
CloseClipboard
SetScrollInfo
TranslateMDISysAccel
RedrawWindow
InsertMenuItemW
GetClipboardData
SetWindowPos
GetMenuStringW
CreatePopupMenu
LoadMenuW
AdjustWindowRectEx
EqualRect
SetClassLongW
SetDlgItemInt
SetMenuItemBitmaps
CreateWindowExW
SetRectEmpty
ShowOwnedPopups
LoadCursorW
DestroyMenu
IsWindow
GetDlgCtrlID
LockWindowUpdate
SendDlgItemMessageW
GetCapture
SetWindowsHookExW
TrackPopupMenu
GetNextDlgGroupItem
LoadImageW
IsWindowVisible
DrawStateW
WindowFromPoint
GetNextDlgTabItem
SetMenuItemInfoW
DrawEdge
IsMenu
IsRectEmpty
OffsetRect
CreateDialogIndirectParamW
SetRect
GetDesktopWindow
UnhookWindowsHookEx
DrawFocusRect
SetWindowTextW
GetScrollInfo
SendDlgItemMessageA
SetCursor
GetAsyncKeyState
CopyIcon
GetDCEx
CopyRect
DestroyIcon
DestroyAcceleratorTable
ModifyMenuW
ReleaseDC
GetCursorPos
FindWindowW
TranslateAcceleratorW
IntersectRect
CallNextHookEx
DestroyCursor
ShowScrollBar
KillTimer
FrameRect
IsClipboardFormatAvailable
GetTopWindow
LoadStringW
SetParent
InsertMenuW
EnumChildWindows
CreateMenu
GetSysColor
GetWindowRect
IsWindowEnabled
SetScrollPos
GetLastActivePopup
BeginPaint
ReleaseCapture
SystemParametersInfoA
CopyImage
DefFrameProcW
ScreenToClient
SetActiveWindow
MapWindowPoints
GetWindowTextW
GetAncestor
MoveWindow
RegisterClassW
EndDeferWindowPos
DestroyCaret
GetMenu
SetFocus
GetMessageW
SetCapture
SetMenu
DrawIcon
SetWindowRgn
DefWindowProcW
MessageBoxW
SetMenuDefaultItem
GetForegroundWindow
ReuseDDElParam
ShowWindow
DrawIconEx
IsZoomed
GetSystemMetrics
GetSystemMenu
LoadIconW
GetDlgItem
WaitForInputIdle
GetDC
FillRect
InflateRect
SetTimer
GetWindowPlacement
ChildWindowFromPoint
GetSubMenu
IsDialogMessageW
GetClassInfoExW
RegisterClassExW
SendMessageW
EndPaint
GetWindowLongW
SetWindowLongW
EnableMenuItem
InvalidateRect
GetWindowDC
SetClipboardData
GetWindowTextLengthW
GetKeyState
GetMenuDefaultItem
GetClientRect
InvalidateRgn
GetMessagePos
PostMessageW
GetActiveWindow
BeginDeferWindowPos
PtInRect
GetUpdateRect
UpdateWindow
GetDoubleClickTime
RegisterClipboardFormatW
TranslateMessage
GetWindowThreadProcessId
GetMenuItemID
WaitMessage
GetWindow
EmptyClipboard
UnionRect
PostQuitMessage
SetForegroundWindow
RemoveMenu
GetScrollPos
ClientToScreen
SetWindowPlacement
AppendMenuW
EnableWindow
GetMenuItemCount
GetIconInfo
GetClassLongW
DrawFrameControl
RegisterWindowMessageW
UnpackDDElParam
EndDialog
IsIconic
CheckMenuItem
GetClassInfoW
ScrollWindow
GetClassNameW
MessageBeep
SetCursorPos
kernel32
VirtualFree
GetModuleFileNameA
FreeEnvironmentStringsA
GetCurrentProcess
GetCurrentProcessId
VirtualAlloc
DeleteFileA
SetLastError
GetACP
SetUnhandledExceptionFilter
GetDateFormatA
IsBadCodePtr
GetLocaleInfoA
TerminateProcess
GetProcAddress
GetModuleHandleW
Sleep
LCMapStringA
GetSystemInfo
DeleteCriticalSection
SetEnvironmentVariableA
GetTickCount
WriteConsoleA
LeaveCriticalSection
GetOEMCP
ConvertDefaultLocale
GetStartupInfoW
GlobalLock
SetFilePointer
RaiseException
CloseHandle
GetModuleFileNameW
GetUserDefaultLangID
GetStringTypeW
TlsSetValue
VirtualProtect
CreateFileW
MultiByteToWideChar
GetSystemTime
LocalFree
GetThreadLocale
InterlockedExchange
ExitProcess
GetVersionExA
GetFileType
GetFileTime
GetSystemTimeAsFileTime
lstrcmpiA
TlsFree
CompareStringW
LCMapStringW
GetCommandLineA
GetEnvironmentStrings
CompareStringA
ReadFile
VirtualQuery
CreateMutexW
HeapReAlloc
GetCPInfo
LoadLibraryW
HeapSize
FindClose
HeapDestroy
TlsAlloc
GetCurrentThread
InterlockedIncrement
QueryPerformanceCounter
FindFirstFileA
GetStartupInfoA
GlobalDeleteAtom
HeapFree
GetFileSize
FreeEnvironmentStringsW
SetStdHandle
SetHandleCount
GetTimeZoneInformation
GetCurrentThreadId
GetLastError
GetTimeFormatA
ExitThread
LoadLibraryA
InitializeCriticalSection
FlushFileBuffers
GetModuleHandleA
GetFullPathNameW
GetEnvironmentStringsW
lstrcpyW
HeapAlloc
FindFirstFileW
GetCommandLineW
RtlUnwind
WideCharToMultiByte
WriteFile
GetLocaleInfoW
GetStringTypeA
TlsGetValue
GetStdHandle
UnhandledExceptionFilter
EnterCriticalSection
HeapCreate
comdlg32
GetOpenFileNameA
GetSaveFileNameA
comctl32
CreateStatusWindowW
InitCommonControlsEx
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ