U:\kubunixydzR\qxbcqXbX\akWjnicvy\LFneBeAscw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3ba7d63c368384d38f65404e8b7c730c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ba7d63c368384d38f65404e8b7c730c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ba7d63c368384d38f65404e8b7c730c_JaffaCakes118
-
Size
216KB
-
MD5
3ba7d63c368384d38f65404e8b7c730c
-
SHA1
f252bbf70e4325d588bec1634ea1420dbd5b47f1
-
SHA256
bf4f549b817bcb5ebbb09c17bdb304c1efe3f0651be8822a05f4ce08a22e9314
-
SHA512
44f174a6d9f83123ca496036a4f3ef63c9b87b22bd82f740f3e8c0f2fc0ed6e965218f3eabf753c3b4ced279be8133f3392cb4cf7efaf45a0b84ea0e68620cfb
-
SSDEEP
3072:CtJ3zHUBmeu+x1GEwOR3au7+zmRReDg1lk2EaTf2LxQENq4QgmvYyRNiNnpO:0zHUBm3+utuOmvjhENDovYyRcn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ba7d63c368384d38f65404e8b7c730c_JaffaCakes118
Files
-
3ba7d63c368384d38f65404e8b7c730c_JaffaCakes118.exe windows:5 windows x86 arch:x86
3bbadb341a700760e5fa50ac8a9eb45b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetOpenFileNameW
shlwapi
PathStripPathW
gdi32
GetTextExtentPoint32A
GetObjectA
WidenPath
Polyline
PathToRegion
SetBkColor
GetTextFaceW
TranslateCharsetInfo
CreatePolygonRgn
LineTo
EnumFontFamiliesW
CreateHalftonePalette
CreatePalette
CreateDiscardableBitmap
EnumFontsW
OffsetRgn
CreateDIBSection
ExtTextOutW
RealizePalette
GetNearestPaletteIndex
SetStretchBltMode
ExtFloodFill
CreateRectRgnIndirect
CreateDIBitmap
LPtoDP
Escape
GetTextExtentPointW
CreatePenIndirect
GetSystemPaletteEntries
EndPage
RestoreDC
CreateHatchBrush
GetTextColor
SelectClipRgn
SetPixel
comctl32
CreatePropertySheetPageA
PropertySheetA
CreateStatusWindowW
ImageList_Destroy
ImageList_Read
user32
DialogBoxParamA
SetClassLongW
CharUpperBuffA
GetActiveWindow
SendInput
ShowScrollBar
CheckMenuItem
TranslateMessage
DestroyIcon
CreateMenu
SetWindowPos
WaitMessage
LoadCursorA
KillTimer
SetDlgItemTextW
SetForegroundWindow
GetMessageW
EndDialog
SetScrollPos
CloseDesktop
InflateRect
OemToCharA
SetCursor
SetActiveWindow
CreateIconIndirect
GetMessageA
ClipCursor
MessageBoxExA
IsDlgButtonChecked
IsCharAlphaNumericW
GetDlgItemInt
LoadCursorW
CharToOemW
InvertRect
TileWindows
PeekMessageW
ShowWindow
RegisterWindowMessageA
IsIconic
CreateCaret
CharNextA
DrawTextExW
DialogBoxIndirectParamA
SetSysColors
CreateWindowExW
GetMenuItemRect
GetMenuStringA
SetParent
PostThreadMessageW
GetWindowLongW
ActivateKeyboardLayout
GetSystemMetrics
GetMenuItemInfoW
GetWindow
CharToOemBuffA
IsWindow
ReleaseDC
PostMessageA
SetMenuItemInfoW
SetFocus
SetWindowLongA
GetTopWindow
LoadImageW
AppendMenuA
SystemParametersInfoW
GetClientRect
GetSubMenu
GetClassInfoExW
GetUpdateRect
GetWindowLongA
InSendMessage
ModifyMenuW
ClientToScreen
EqualRect
SetWindowLongW
GetMonitorInfoW
GetScrollInfo
CharUpperW
LoadStringA
RemovePropW
PeekMessageA
ScreenToClient
EnumWindows
SetWindowPlacement
GetClassInfoExA
GetDCEx
SetDlgItemInt
kernel32
GetNumberFormatW
VirtualFree
LoadLibraryExA
GetCPInfo
SetupComm
CompareStringW
SetFileApisToOEM
GlobalSize
GetShortPathNameW
MoveFileA
MoveFileExW
CreateWaitableTimerW
GetComputerNameW
GetThreadTimes
GlobalGetAtomNameA
CreateNamedPipeA
EnumResourceLanguagesA
CreateDirectoryW
SetEndOfFile
LocalLock
LocalUnlock
SetThreadContext
BuildCommDCBAndTimeoutsW
GetTimeFormatW
WriteFile
WaitForMultipleObjectsEx
ResetEvent
CopyFileW
CreateMailslotW
GetFileType
GetTickCount
UnlockFile
GetComputerNameA
CreateFileMappingA
lstrcmpW
InitializeCriticalSection
HeapReAlloc
CompareFileTime
GetCurrentDirectoryW
GetTempFileNameW
GlobalAlloc
msvcrt
_controlfp
fclose
perror
__set_app_type
wcscpy
atoi
towupper
iswspace
isalpha
__p__fmode
__p__commode
isprint
wcstol
_amsg_exit
_initterm
_acmdln
wcscat
exit
atol
wcstoul
_ismbblead
ungetc
fputs
mbtowc
wcsstr
strrchr
iswctype
fputc
_XcptFilter
_exit
_cexit
__setusermatherr
strpbrk
wcstod
__getmainargs
swscanf
strtol
wcspbrk
clock
Exports
Exports
?SleepAhHJDud@@YGKEPA_WG@Z
?SleepUDSUDlkdlsds@@YGKEPA_WG@Z
?SleepUDudjkUD@@YGKEPA_WG@Z
?SleepYDyjDuUI@@YGKEPA_WG@Z
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 211B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ