Q:\interactivity\dictate\enhanceme.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d7e986fbd5c9d2fe1e3136972be77138_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d7e986fbd5c9d2fe1e3136972be77138_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d7e986fbd5c9d2fe1e3136972be77138_JaffaCakes118
-
Size
407KB
-
MD5
d7e986fbd5c9d2fe1e3136972be77138
-
SHA1
d8ea67039e5a11ae56bf5b201abc6102bae166c3
-
SHA256
54589d39787e1dc5c854a6594eb4898c73b121d93d50e8e5c1f54bd87bb38c6d
-
SHA512
a483d10d645186fe6061994aac265f9ffd67c633079353ca5ea70c6d0bb53f2d1eee038cf25dcc96e6482ccc7112cb2aa5d1f31d4ff6daec04a66d23d547a891
-
SSDEEP
6144:lqRoZmDvxPxnzYxlCP+n5GgPpWm+CkMQGgcVDBk4EBSuiF4d62ql4PHfIRhvBd1+:OoZmLxpnzuC70hnXVb9PWdS4P/IRpX3U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7e986fbd5c9d2fe1e3136972be77138_JaffaCakes118
Files
-
d7e986fbd5c9d2fe1e3136972be77138_JaffaCakes118.exe windows:5 windows x86 arch:x86
08ffa6349f6b37c649177def5f7bb65d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_DEBUG_STRIPPED
PDB Paths
Imports
kernel32
WriteConsoleW
SetStdHandle
HeapReAlloc
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
HeapSize
Sleep
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
CreateFileW
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
lstrcatA
FreeEnvironmentStringsW
GetModuleFileNameW
ExitProcess
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapCreate
GetCurrentThreadId
SetLastError
GetModuleHandleW
InterlockedIncrement
TlsFree
TlsSetValue
CreateFileA
GetFileSize
CreateFileMappingA
CloseHandle
MapViewOfFileEx
UnmapViewOfFile
GetLastError
GetStdHandle
GetConsoleScreenBufferInfo
lstrlenA
FillConsoleOutputCharacterA
FillConsoleOutputAttribute
HeapAlloc
SetConsoleCursorPosition
GetCurrentThread
GetCurrentDirectoryA
OpenFile
QueryPerformanceCounter
_lclose
LoadLibraryA
MulDiv
LoadLibraryW
WriteFile
GetCurrentProcess
GetModuleFileNameA
EnumDateFormatsA
InterlockedDecrement
GetProcAddress
TlsGetValue
TlsAlloc
DecodePointer
EncodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
LoadLibraryExA
BeginUpdateResourceA
GetModuleHandleA
GetEnvironmentStringsW
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapFree
RtlUnwind
RaiseException
FlushFileBuffers
user32
CreateDialogParamW
CreatePopupMenu
GetMenu
GetSubMenu
GetDlgItem
TrackPopupMenuEx
AppendMenuA
CreateMenu
GetWindow
SetTimer
CreateWindowExA
DefWindowProcA
DestroyWindow
PostQuitMessage
GetWindowTextLengthA
GetDlgItemTextA
LoadImageA
InvalidateRect
BeginPaint
SetRect
SendMessageA
GetClientRect
EndPaint
GetSystemMetrics
DrawIcon
GetSysColor
LoadBitmapA
UnionRect
GetMenuState
CheckMenuItem
SetMenuItemBitmaps
DrawMenuBar
InsertMenuItemA
GetCursorPos
GetWindowTextA
SetFocus
ShowWindow
FillRect
MapWindowPoints
IsDlgButtonChecked
SetWindowTextA
EnableWindow
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
SetWindowLongA
gdi32
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreateCompatibleBitmap
CreateBitmap
GetPixel
SetPixel
SetBkMode
CreateHatchBrush
CreatePen
CreateFontA
SetBkColor
SetTextColor
CreateSolidBrush
FillRgn
CreateFontIndirectA
DeleteObject
GetObjectA
comdlg32
ReplaceTextA
GetSaveFileNameA
advapi32
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
OpenThreadToken
ole32
OleInitialize
oleaut32
VariantInit
psapi
EnumProcessModules
GetModuleBaseNameA
GetModuleInformation
comctl32
CreateToolbarEx
InitCommonControlsEx
ord6
secur32
InitializeSecurityContextA
AcquireCredentialsHandleA
GetUserNameExW
CompleteAuthToken
dbghelp
EnumerateLoadedModules
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 199KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ