I:\MBcwcqIp\yEaiuCvxINgJs\khjprmksvbzjO\oPsAhZjY.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3c56791d4bb457a1c107ebc93534f124_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c56791d4bb457a1c107ebc93534f124_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3c56791d4bb457a1c107ebc93534f124_JaffaCakes118
-
Size
209KB
-
MD5
3c56791d4bb457a1c107ebc93534f124
-
SHA1
96996c099c4c609da1494f2ca162205846af5d25
-
SHA256
a4ee9a15cc3eaa824492546bdb924a1405cc04ef0fb9179961c7602e6e54e444
-
SHA512
c4bc73c062e521056d305584e80de9fcdb974703a496173eef1c2a93e040c252411fb97237739ca4e20fea244ebb91fd713ad28138aebd45c9635dab8f4eefb4
-
SSDEEP
3072:q/DFUNssO+nG0C+UIdNIFIP3CB9Vz2KhOBHZu2qrL1wHcCIH/iBIAIwR/weHNIy:ycO+sfFIP3CcKaI2OwHeH5wR/Tn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c56791d4bb457a1c107ebc93534f124_JaffaCakes118
Files
-
3c56791d4bb457a1c107ebc93534f124_JaffaCakes118.exe windows:5 windows x86 arch:x86
3e9a2e2e4d3eebd6958d737db0c1ad5b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
MessageBoxExA
GetClassInfoExA
IsCharLowerA
SetCursor
IsCharAlphaW
IsCharUpperA
FrameRect
LoadImageA
MapVirtualKeyExW
GetWindowDC
MonitorFromRect
CharUpperBuffW
FindWindowExW
CheckRadioButton
GetMenuItemInfoW
SetCaretPos
CreateDialogParamW
SetForegroundWindow
LoadBitmapA
CharPrevA
GetSystemMetrics
CreateAcceleratorTableW
DefFrameProcA
CharUpperW
GetAltTabInfoW
CharNextA
LoadStringW
GetKeyboardLayoutNameW
DefFrameProcW
SetDlgItemInt
WaitMessage
GetNextDlgGroupItem
GetDlgCtrlID
ReplyMessage
GetCaretPos
GetDialogBaseUnits
SetRect
ReleaseDC
comctl32
ImageList_GetIcon
ImageList_Remove
ImageList_Read
gdi32
UnrealizeObject
PolyBezier
MoveToEx
CreateBrushIndirect
GetSystemPaletteUse
ExtFloodFill
CreateEllipticRgnIndirect
EndDoc
GetFontData
StretchBlt
GetObjectA
SetDIBits
CreateHalftonePalette
IntersectClipRect
comdlg32
ReplaceTextW
GetSaveFileNameA
ChooseFontW
kernel32
lstrcpyW
GetTimeFormatA
HeapValidate
EnumResourceNamesW
GetSystemTimeAdjustment
FileTimeToLocalFileTime
DeleteFileW
GlobalAddAtomW
SetThreadExecutionState
LocalFree
GetFileType
UnhandledExceptionFilter
GetComputerNameA
lstrcmpiW
GetSystemDirectoryA
GetSystemTimeAsFileTime
advapi32
SetSecurityDescriptorOwner
GetNumberOfEventLogRecords
msvcrt
iswctype
putchar
_controlfp
__set_app_type
wcstol
__p__fmode
iswxdigit
iswalpha
__p__commode
_amsg_exit
_initterm
_acmdln
free
memcpy
atol
exit
_ismbblead
_XcptFilter
_exit
_cexit
fseek
gets
time
__setusermatherr
__getmainargs
Exports
Exports
AlphaBlend
GradientFill
TransparentBlt
?ValidateSDKldjhJLD@@YGKEPA_WG@Z
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idat Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_0 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_2 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ydiag Size: 512B - Virtual size: 77B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mem Size: - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdiag Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ