R:\bijndra\BkiDXvtjrl\lSCxdbnpw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3dc8d21f5e0fbd562fd1710597238665_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3dc8d21f5e0fbd562fd1710597238665_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3dc8d21f5e0fbd562fd1710597238665_JaffaCakes118
-
Size
213KB
-
MD5
3dc8d21f5e0fbd562fd1710597238665
-
SHA1
c67e46eff7740b751d236e51215affcd68623a8d
-
SHA256
46249b99ef8542653faa3ddbf458934e9cd6c4c1a1c7503c83ccd7a719895dc1
-
SHA512
327b7a13a91d5d9bc5ccb21d4aa15ac088b0fef5b5e938d5a115b4a6adb18cb4a060f9b624456f70467eb0dc07d70805db9d06d41f610fef3d9fcea573949279
-
SSDEEP
6144:yanAPpzYkxxJ4id8tOtGIHK7Z9rICPZYb5:W0DntDIHyKCB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3dc8d21f5e0fbd562fd1710597238665_JaffaCakes118
Files
-
3dc8d21f5e0fbd562fd1710597238665_JaffaCakes118.exe windows:5 windows x86 arch:x86
ed492eaefb301382dca86798eff7240d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
mktime
_controlfp
bsearch
time
__set_app_type
__p__fmode
malloc
__p__commode
_amsg_exit
iswctype
iswalpha
_initterm
_acmdln
wcschr
exit
sscanf
_ismbblead
_XcptFilter
_exit
_cexit
iswdigit
isalpha
__setusermatherr
__getmainargs
gdi32
BeginPath
CreatePolygonRgn
CreatePalette
SetDIBColorTable
SetLayout
SetBkColor
GetWindowOrgEx
CloseFigure
GetNearestColor
ExcludeClipRect
LPtoDP
PtVisible
CreateICW
CreateRoundRectRgn
WidenPath
DPtoLP
user32
EnableMenuItem
GetClassInfoW
CreateIconFromResource
PostQuitMessage
SetDlgItemTextA
SendDlgItemMessageA
LoadMenuA
DestroyIcon
BringWindowToTop
CreateDialogIndirectParamW
SetForegroundWindow
CharToOemW
EnableWindow
GetClipCursor
LoadImageA
GetSystemMetrics
DefWindowProcA
GetLastActivePopup
IntersectRect
TranslateMessage
AppendMenuW
RegisterClassA
GetClassNameW
SetScrollRange
GetWindowTextA
PostMessageW
CloseDesktop
SetClassLongW
keybd_event
DrawEdge
RegisterHotKey
GetMenuItemID
SetDlgItemInt
ScrollWindow
GetSysColorBrush
kernel32
CreateThread
GetExitCodeThread
FindFirstFileW
IsDBCSLeadByte
GetHandleInformation
DefineDosDeviceW
GetModuleHandleA
FindNextFileW
SetCommMask
SetUnhandledExceptionFilter
TerminateThread
lstrcpyA
IsBadStringPtrW
CreateFileA
WaitForSingleObjectEx
GetWindowsDirectoryW
lstrcatW
CallNamedPipeW
Exports
Exports
?InitializeCriticalSectionAndSpinCountHDhdhHGHdhds@@YGKEPA_WG@Z
Sections
.text Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.div Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.diag_y Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 388B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.plus Size: 1024B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ