mstore.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fe0d21caf130ad2e6f91265b42b010e9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe0d21caf130ad2e6f91265b42b010e9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fe0d21caf130ad2e6f91265b42b010e9_JaffaCakes118
-
Size
194KB
-
MD5
fe0d21caf130ad2e6f91265b42b010e9
-
SHA1
b9eaa1eff68c3ba36c2fd83e69be1ad97a968ee4
-
SHA256
e9aa669d8d29c6cef33019dfa8e636dd897ad7b9108003d7e82349c0326da98d
-
SHA512
e3f5b9c48ac58c363edc454612502239352f5722371332e29b0ec2664a4974c016a05ec7a340ea7e02701833163362b91f16c42210173b0e803a5579e92f350f
-
SSDEEP
3072:HsI7iqBwrKHFI5FyE68YQk76TsrqYumZqz1WSBHLQpyd2CilwgD1UiZybrV+5:HsI7DAFyE67Q+0SumZstBHLsCiCsyk5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe0d21caf130ad2e6f91265b42b010e9_JaffaCakes118
Files
-
fe0d21caf130ad2e6f91265b42b010e9_JaffaCakes118.exe windows:4 windows x86 arch:x86
8f1ee3afbd2b99fdb4331fcded6577d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_except_handler3
memset
_vsnwprintf
wcscmp
_controlfp
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
swscanf
_CxxThrowException
realloc
malloc
free
_wtoi
_wcsnicmp
wcslen
__CxxFrameHandler
_mbsrchr
wintrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WTHelperGetProvCertFromChain
WinVerifyTrust
crypt32
CryptHashPublicKeyInfo
kernel32
GetStartupInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
LocalAlloc
UnhandledExceptionFilter
TerminateProcess
FormatMessageA
LocalFree
GetSystemDirectoryW
LoadLibraryExW
SetUnhandledExceptionFilter
GetCommandLineW
VirtualAlloc
ExitProcess
GetTickCount
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetCurrentProcess
QueryPerformanceCounter
CloseHandle
WaitForSingleObject
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
SetEvent
CreateThread
CreateEventA
GetLastError
GetCurrentThreadId
AddAtomA
SetErrorMode
FreeLibrary
Sleep
InterlockedIncrement
lstrlenW
GetModuleHandleA
MultiByteToWideChar
lstrlenA
GetModuleFileNameA
WideCharToMultiByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
LoadLibraryA
user32
GetFocus
SetFocus
SetWindowLongA
GetWindowLongA
MessageBeep
DestroyWindow
GetClientRect
MoveWindow
DestroyIcon
GetSystemMetrics
GetAsyncKeyState
GetParent
SetCursor
GetClassNameA
EnableWindow
SystemParametersInfoA
KillTimer
PostQuitMessage
IsIconic
GetWindowRect
OffsetRect
GetWindowPlacement
SetWindowPos
DispatchMessageA
GetMessageA
GetCursorPos
EndPaint
FillRect
BeginPaint
IsWindow
GetActiveWindow
MessageBoxW
MessageBoxA
SetRect
CharNextA
LoadIconA
LoadCursorA
ShowWindow
UpdateWindow
LoadAcceleratorsA
PeekMessageA
WaitMessage
TranslateAcceleratorA
TranslateMessage
SetTimer
SendMessageA
GetMessageW
PostThreadMessageA
RegisterWindowMessageA
advapi32
RegQueryInfoKeyA
RegOpenKeyExW
RegQueryValueExW
RegSetValueExA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
ole32
OleGetClipboard
CoRegisterMessageFilter
OleUninitialize
OleFlushClipboard
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoRegisterClassObject
CoRevokeClassObject
OleSetClipboard
RegisterDragDrop
RevokeDragDrop
CoTaskMemRealloc
StringFromGUID2
oleaut32
SafeArrayDestroy
VariantClear
SysFreeString
SysAllocStringLen
SysAllocString
SysStringLen
VarUI4FromStr
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE