R:\ivdabHgvolg\kcKwnaYX\dKGeqyusLuy\wcxipqUah\mbNGDrtuzuZgk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
42dd3e0574eadb0dd67467aeb4a49416_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
42dd3e0574eadb0dd67467aeb4a49416_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
42dd3e0574eadb0dd67467aeb4a49416_JaffaCakes118
-
Size
138KB
-
MD5
42dd3e0574eadb0dd67467aeb4a49416
-
SHA1
795babdd493344252f0560da09e53783e226df5b
-
SHA256
1ac6f8ed062d68864a9a54879274d84aeced61ac3ecdd4d6aa4b9e107b9717dc
-
SHA512
52b0e9701d0a7c725dcbdfd95c09a0fa9a00c6cc4a2b8c4378703f89414622c42a1cafe40f1e5b3020cfc6eac2d6b87a329350db1fa9596bc44fd4b83d10a879
-
SSDEEP
3072:96f1Ei2D8iOc1W28ycgNJr77bmNiTJjmpDBX6nJD0yizcb:gKitiON28ycyJr/bmE1qtJ6Tiz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42dd3e0574eadb0dd67467aeb4a49416_JaffaCakes118
Files
-
42dd3e0574eadb0dd67467aeb4a49416_JaffaCakes118.exe windows:5 windows x86 arch:x86
4cad256e43a5a8420da78d746c46b06e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
StrTrimA
gdi32
GetViewportOrgEx
CreateRectRgnIndirect
TextOutA
CreateFontA
Ellipse
DeleteObject
ExtTextOutA
GetNearestPaletteIndex
SelectClipRgn
SetWindowExtEx
RoundRect
SelectObject
GetMapMode
CreateFontIndirectA
kernel32
GetModuleHandleA
CreateThread
LoadLibraryExA
EnumResourceLanguagesA
VerSetConditionMask
GetModuleFileNameA
VirtualProtect
LeaveCriticalSection
GetTickCount
CopyFileW
LoadResource
GetCommTimeouts
GlobalFindAtomW
IsValidLanguageGroup
ReleaseSemaphore
GetFileAttributesA
GlobalGetAtomNameA
msvcrt
exit
user32
SetWindowTextA
GetDC
ScrollWindowEx
AppendMenuW
ActivateKeyboardLayout
GetMenuItemCount
CharLowerW
SendDlgItemMessageA
RedrawWindow
SetClassLongW
LoadIconW
GetClassInfoW
GetClassNameW
SetScrollPos
OffsetRect
TileWindows
EqualRect
ChangeMenuW
GetScrollPos
MessageBoxExA
SetScrollRange
GetKeyboardLayoutList
ShowCursor
DrawStateA
AllowSetForegroundWindow
SetCursorPos
IsCharAlphaNumericW
CreateWindowExA
Exports
Exports
?_THD__Q_GKAP_XCx_so@@UGKNE@Z
Sections
.text Size: 116KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 211B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp1 Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp2 Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tmp3 Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp4 Size: 512B - Virtual size: 434B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tsc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ