X:\v\z\52e5\j3ol5u8z.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2a2c82f5340c5d6db87a339abe9e9710.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2a2c82f5340c5d6db87a339abe9e9710.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_2a2c82f5340c5d6db87a339abe9e9710
-
Size
820KB
-
MD5
2a2c82f5340c5d6db87a339abe9e9710
-
SHA1
a0c27bff5f48e600041c248b70ff34b734d14937
-
SHA256
43474b5115cb81674922ce5cf4959d3cf338d409af17e5806d2724cf7a80456a
-
SHA512
9610a3ad8ae036e03eb5951184bd7dc70203c39900e6bdefb4cf2202ad02ba24347f97c9d151aac91a682d3325d178fe5ea18b484636e28b04043cf432e9ddef
-
SSDEEP
12288:ZbXzt17VreAWEnKu8sJwDHTBhinen7SMP5cNMIUe4jjVfX4TXlLCzUPpgWHoutS:RXZFVreni8VDHTBMw7GNXU3jVfQOSNS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_2a2c82f5340c5d6db87a339abe9e9710
Files
-
JaffaCakes118_2a2c82f5340c5d6db87a339abe9e9710.exe windows:5 windows x86 arch:x86
2ad97685d3f08714a187421ae66968d4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
RtlUnwind
TlsGetValue
SetConsoleCtrlHandler
GetACP
HeapReAlloc
CreateThread
GetModuleFileNameW
GetExitCodeThread
CancelIo
SetFilePointer
lstrlenW
CloseHandle
SleepEx
SystemTimeToFileTime
GetThreadPriority
GetModuleHandleW
MulDiv
SetEvent
VirtualQuery
GetCurrentThreadId
VirtualProtect
GetFileAttributesExW
GetCurrentProcessId
IsProcessorFeaturePresent
ExitProcess
RemoveDirectoryW
InterlockedDecrement
IsDebuggerPresent
GetEnvironmentStringsW
CopyFileW
GetProcAddress
InitializeCriticalSection
SizeofResource
CreateMutexW
LoadLibraryW
GetFileTime
GetOverlappedResult
FindResourceExW
InterlockedCompareExchange
GetCurrentThread
GetProcessAffinityMask
TlsSetValue
InterlockedIncrement
WriteFile
GlobalFree
MoveFileExW
GetVersion
ReadFile
LocalFileTimeToFileTime
SetUnhandledExceptionFilter
EnterCriticalSection
GetConsoleMode
GetVersionExW
OutputDebugStringW
LoadResource
VirtualFree
WaitForSingleObject
GlobalLock
FlushFileBuffers
FindResourceW
SetThreadPriority
FindNextFileW
WaitForMultipleObjects
SetLastError
SetThreadExecutionState
LoadLibraryA
GetConsoleCP
LeaveCriticalSection
WideCharToMultiByte
ExitThread
FreeEnvironmentStringsW
HeapQueryInformation
HeapSize
TlsFree
SetHandleCount
HeapDestroy
GlobalAlloc
DeleteFileW
GlobalUnlock
FindFirstFileW
FileTimeToLocalFileTime
GetProcessTimes
GetStartupInfoA
GetProcessVersion
GetModuleFileNameA
OutputDebugStringA
LocalFree
GetFileSize
VirtualAlloc
FindClose
QueryPerformanceCounter
TlsAlloc
GetFileInformationByHandle
GetSystemTimeAsFileTime
RaiseException
HeapAlloc
ReadDirectoryChangesW
FreeLibrary
GetFileType
GetStdHandle
GetSystemInfo
HeapFree
DuplicateHandle
FileTimeToSystemTime
GetFileAttributesW
GetSystemDirectoryW
MultiByteToWideChar
LocalAlloc
UnhandledExceptionFilter
ResetEvent
GetCPInfo
LCMapStringW
CreateEventW
FlushInstructionCache
SetStdHandle
WriteConsoleW
GetOEMCP
GetCurrentProcess
IsValidCodePage
DeleteCriticalSection
QueryPerformanceFrequency
GetLastError
GlobalSize
GetStringTypeW
CreateFileW
HeapSetInformation
InterlockedExchange
TerminateProcess
ResumeThread
GetCommandLineW
HeapCreate
GetTickCount
Sleep
GetProcessHeap
InitializeCriticalSectionAndSpinCount
SetEndOfFile
SetErrorMode
LockResource
user32
SetClipboardData
EnumChildWindows
RegisterClipboardFormatW
DrawTextW
SetTimer
CheckMenuRadioItem
WindowFromPoint
GetDC
DispatchMessageW
EndDeferWindowPos
TrackPopupMenu
RegisterClassW
InvalidateRect
GetDlgCtrlID
EndDialog
SetLayeredWindowAttributes
PeekMessageW
DestroyMenu
SetWindowLongW
EnumWindows
CreatePopupMenu
EnumThreadWindows
wsprintfW
RegisterShellHookWindow
CallWindowProcW
SetMenuItemInfoW
GetKeyState
AdjustWindowRectEx
UpdateWindow
EnableWindow
GetSystemMetrics
GetComboBoxInfo
CharUpperW
LoadAcceleratorsW
LoadImageW
MessageBoxW
IsCharAlphaW
GetMessagePos
GetMenuItemInfoW
ScreenToClient
SetWindowPos
SetWindowTextW
GetScrollInfo
GetWindowLongW
TranslateMessage
GetWindowRect
AdjustWindowRect
GetMenuItemCount
CloseClipboard
IsChild
CreateDialogParamW
GetWindowDC
EndPaint
CharLowerW
RegisterHotKey
MapVirtualKeyW
RedrawWindow
CallNextHookEx
GetClientRect
PostQuitMessage
SendDlgItemMessageW
wsprintfA
DialogBoxParamW
UnregisterHotKey
MapWindowPoints
MonitorFromPoint
GetParent
SetForegroundWindow
DestroyWindow
IntersectRect
FillRect
GetClassInfoExW
DeferWindowPos
DestroyIcon
DestroyAcceleratorTable
DrawEdge
ShowWindow
KillTimer
GetMenu
GetWindowThreadProcessId
ClientToScreen
DeregisterShellHookWindow
GetClassNameW
IsDialogMessageW
AppendMenuW
OpenClipboard
SetWindowsHookExW
SetCapture
BeginDeferWindowPos
LoadIconW
GetMonitorInfoW
SetActiveWindow
UnregisterClassA
CreateWindowExW
GetWindowTextW
GetWindowPlacement
IsWindowVisible
UnregisterClassW
GetFocus
PostMessageW
TrackPopupMenuEx
CopyRect
GetDlgItem
MsgWaitForMultipleObjects
MessageBeep
TranslateAcceleratorW
SetFocus
RegisterWindowMessageW
EmptyClipboard
RegisterClassExW
SetDlgItemTextW
SetCursor
GetSysColor
MapDialogRect
MonitorFromRect
DefWindowProcW
DrawIconEx
ReleaseDC
LoadCursorW
SendMessageW
AllowSetForegroundWindow
BeginPaint
UnhookWindowsHookEx
IsClipboardFormatAvailable
GetActiveWindow
IsIconic
IsWindowEnabled
GetMessageW
MoveWindow
GetClipboardData
OffsetRect
gdi32
CreateFontIndirectW
DeleteDC
GetStockObject
CreateCompatibleDC
GetDeviceCaps
SetDCBrushColor
GetObjectW
ExtTextOutW
SetTextColor
DeleteObject
GetTextExtentPoint32W
OffsetWindowOrgEx
SelectObject
SetBkColor
SetBkMode
CreateCompatibleBitmap
SetWindowOrgEx
advapi32
RegEnumKeyExW
RegCreateKeyExW
CryptDestroyKey
RegCreateKeyW
CryptHashData
RegQueryValueExW
CryptDestroyHash
RegCloseKey
CryptCreateHash
RegOpenKeyExW
RegSetValueExW
RegEnumValueW
CryptImportKey
CryptAcquireContextW
RegQueryInfoKeyW
RegOpenKeyW
CryptVerifySignatureW
CryptReleaseContext
RegDeleteValueW
CryptGetHashParam
ole32
CoCreateInstance
CoUninitialize
CoCreateGuid
OleSetClipboard
OleInitialize
ReleaseStgMedium
OleGetClipboard
OleUninitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CoInitialize
CoTaskMemFree
shlwapi
SHAutoComplete
ColorHLSToRGB
SHDeleteKeyW
StrCmpLogicalW
crypt32
CertFreeCertificateContext
CertOpenSystemStoreW
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateChain
CertVerifyTimeValidity
CertVerifyRevocation
CertVerifyCertificateChainPolicy
CertGetCertificateChain
iphlpapi
AddIPAddress
secur32
FreeContextBuffer
ApplyControlToken
QueryContextAttributesW
AcquireCredentialsHandleW
DecryptMessage
FreeCredentialsHandle
DeleteSecurityContext
EncryptMessage
InitializeSecurityContextW
oledlg
ord6
wldap32
ord44
psapi
GetModuleFileNameExA
GetProcessMemoryInfo
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ppex Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idat Size: 673KB - Virtual size: 5.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 101B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ