c:\Such\Fun\best\Both\Thousand\even\wintermatch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f223d57af3bd429fc77c751d3cbe695f_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
f223d57af3bd429fc77c751d3cbe695f_JaffaCakes118
-
Size
350KB
-
MD5
f223d57af3bd429fc77c751d3cbe695f
-
SHA1
9b0d57d357e198f82ba5314b4445b84334dc5690
-
SHA256
b7b61d19b86922f23e094a36cadf0a5678b4a6876625103bfb50f3d481de33ca
-
SHA512
e2c4a6e437269589628f5239ec0e8a1557ff794d723cf2dfee6c29564b6c8a5b1c77ae72c86b46d415d5e70654812623e3f8761a2d12a834d3583827fdcbf406
-
SSDEEP
6144:RukiCIXQRFUPRLLHpsn4kk4JMWmaF0oc:R0vXqFMFHps4kZeuz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f223d57af3bd429fc77c751d3cbe695f_JaffaCakes118
Files
-
f223d57af3bd429fc77c751d3cbe695f_JaffaCakes118.exe windows:5 windows x86 arch:x86
cbe4e98d1a8a97f8b718d29a2fd9a8aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
LoadLibraryW
WriteConsoleW
SetStdHandle
CreateFileW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CloseHandle
SetFilePointer
CompareStringW
GetTempPathA
GetCurrentProcessId
TlsAlloc
GetCurrentDirectoryA
GetModuleHandleA
FindNextFileA
GetModuleFileNameA
WaitForMultipleObjects
LoadLibraryA
GetTempFileNameA
GetProcAddress
FindFirstFileA
GetShortPathNameA
MultiByteToWideChar
GetEnvironmentVariableA
GetFileAttributesA
Sleep
TlsSetValue
GetWindowsDirectoryA
WaitForSingleObject
ExitProcess
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
TlsGetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetStringTypeW
GetLocaleInfoW
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetEnvironmentVariableA
user32
CallNextHookEx
EnumWindows
GetWindowLongA
CreateWindowExA
ReleaseDC
DefWindowProcA
GetClassInfoExA
gdi32
RestoreDC
ExtTextOutA
StartDocA
Rectangle
CreateFontIndirectA
StartPage
comctl32
ImageList_Remove
ImageList_GetImageCount
ImageList_SetBkColor
ImageList_SetIconSize
ImageList_Destroy
shlwapi
StrRetToBufA
StrCmpNA
StrStrA
UrlIsA
PathCreateFromUrlA
advapi32
RegCloseKey
RegEnumKeyA
RegOpenKeyA
FreeSid
OpenSCManagerA
AllocateAndInitializeSid
QueryServiceStatus
RegOpenKeyExA
RegCreateKeyExA
LookupPrivilegeValueA
InitializeSecurityDescriptor
RegDeleteKeyA
RegQueryValueExA
RegisterServiceCtrlHandlerA
RegSetValueExA
GetTokenInformation
SetEntriesInAclA
OpenThreadToken
DeleteService
StartServiceCtrlDispatcherA
OpenProcessToken
OpenServiceA
Sections
.text Size: 153KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ