C:\gvJaadJmmrwh\xNzunaarzaBflg\fEwzAfqpim.pdb
Static task
static1
Behavioral task
behavioral1
Sample
52c443690baa7353e348a12763b1dbc8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52c443690baa7353e348a12763b1dbc8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
52c443690baa7353e348a12763b1dbc8_JaffaCakes118
-
Size
40KB
-
MD5
52c443690baa7353e348a12763b1dbc8
-
SHA1
d4072f1994e457c44190d0cb2e10c41988bd7e32
-
SHA256
8758b619ca674af2d26a86371ce6e2958d167121d31678192fc7891898190393
-
SHA512
d80027f0adf50d3706530a05a5128fc2ba9367e6358fd630d95aa9c030f347010879301d3cb8da339cfba48404e6cbc8840c8b54573869c5f306f26481f18c88
-
SSDEEP
768:weQByzS8RXcSF/+SsKMhP0Ws3n/XmQUSAd8ciEOGaounwhXwWGhtz:FWIXTGSEK2QbciZlweZz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52c443690baa7353e348a12763b1dbc8_JaffaCakes118
Files
-
52c443690baa7353e348a12763b1dbc8_JaffaCakes118.exe windows:5 windows x86 arch:x86
dda68af89a5b58d7044ce6ca235b6d9e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
GetViewportOrgEx
BeginPath
GetNearestPaletteIndex
CreateRectRgn
Rectangle
CreateRectRgnIndirect
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_amsg_exit
_initterm
_ismbblead
_XcptFilter
_exit
realloc
memset
_cexit
atoi
__setusermatherr
srand
__getmainargs
kernel32
LoadLibraryA
GetModuleFileNameA
FindFirstFileW
lstrcmpiW
lstrcpynA
OpenSemaphoreW
HeapFree
LocalLock
lstrlenA
OpenFileMappingW
LoadLibraryExA
user32
SendDlgItemMessageW
TrackPopupMenuEx
GetMessageA
DestroyCursor
IsWindowEnabled
wsprintfW
GetDC
FindWindowA
shlwapi
UrlGetLocationW
ChrCmpIW
Exports
Exports
?CreateDlgMessage@@YGHPAXPADK|U
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idir Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 136KB - Virtual size: 394KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE