C:\Oats Fins\Teatbuff Oastvau.pdb
Static task
static1
Behavioral task
behavioral1
Sample
40556290cea73c60de66525dfed35570_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40556290cea73c60de66525dfed35570_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40556290cea73c60de66525dfed35570_JaffaCakes118
-
Size
180KB
-
MD5
40556290cea73c60de66525dfed35570
-
SHA1
5a4563e44e7f842b6fd5b7d8a2229305fc9e125f
-
SHA256
8008239740ba13b1b5b261a70f312f3741235f597b4e741b8149a658a8fc538d
-
SHA512
77151349dbb0197719e020c02e26d1965149b37860d9f56247cf5fdf82443a701b8c7d291a5365724df295d32e10f694996c5ec4952053406548d2eb47024a19
-
SSDEEP
3072:2qQQc9FWTUQRM4md0OAupj6sEfB40EBz+SlQgRVgpcNv4tSbIxqQIGhPr3el2fnm:WQc9FW48UeVussEp8ES/KcxFilPr3elj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40556290cea73c60de66525dfed35570_JaffaCakes118
Files
-
40556290cea73c60de66525dfed35570_JaffaCakes118.exe windows:5 windows x86 arch:x86
d0b88b01980673cd44976521910d9975
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathFindExtensionA
kernel32
GetConsoleAliasExesLengthW
GetVolumeInformationW
ExitProcess
GetLocaleInfoA
GetWindowsDirectoryA
GetPrivateProfileSectionW
FindClose
SetCurrentDirectoryW
HeapReAlloc
GetSystemDefaultLangID
GetCommandLineW
GetEnvironmentVariableW
GetDriveTypeW
GetSystemDefaultUILanguage
GetConsoleAliasExesLengthA
GetCurrentProcess
GlobalLock
GetUserDefaultLCID
GetLogicalDrives
GetDriveTypeA
GetVolumeInformationA
CreateSemaphoreA
MulDiv
LocalReAlloc
CreateProcessA
IsValidLanguageGroup
IsDBCSLeadByte
GetEnvironmentVariableA
GetConsoleOutputCP
GetStdHandle
GetLogicalDriveStringsA
IsDBCSLeadByteEx
SetLastError
GetThreadLocale
IsValidCodePage
SetFileApisToOEM
CreateSemaphoreW
GetOEMCP
GetModuleHandleA
FindNextFileW
GetCurrentThreadId
GetDiskFreeSpaceExW
GetVersion
GetCurrentProcessId
user32
DrawFrameControl
DdeConnect
AdjustWindowRectEx
CreateIconFromResource
GetClassLongW
GetClassInfoExA
GetUpdateRgn
SwitchToThisWindow
DefMDIChildProcW
DdeKeepStringHandle
FlashWindow
SetScrollPos
GetWindowThreadProcessId
GetMessageTime
InSendMessage
GetScrollPos
DestroyIcon
SetWindowTextW
FindWindowA
OpenClipboard
GetKeyNameTextW
GetKeyboardType
ClipCursor
IsWindow
SetThreadDesktop
IsCharLowerW
CreatePopupMenu
SetMenu
EnumChildWindows
GetMenuStringA
GetDesktopWindow
DdeCmpStringHandles
GetDlgItem
GetMenuState
GetClipboardData
GetWindowLongA
CharLowerA
SetCursorPos
DdeUninitialize
MapVirtualKeyA
GetAsyncKeyState
SetLastErrorEx
GetDC
IsCharUpperW
ShowCaret
SetFocus
FindWindowW
CharLowerBuffW
IsCharAlphaW
CharPrevW
DefFrameProcA
EnumDisplaySettingsA
CharUpperA
GetProcessWindowStation
DdeQueryNextServer
GetParent
LoadBitmapA
GetSubMenu
GetKeyState
SetCapture
GetTopWindow
DdeGetLastError
ImpersonateDdeClientWindow
SetActiveWindow
MapVirtualKeyW
VkKeyScanW
GetClassNameA
CloseClipboard
GetWindowTextLengthW
CopyAcceleratorTableW
Exports
Exports
?MaudAlowhajjshodli@@YG_KUAsksDozydatoOustdudki@@IEH@Z
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ