i:\_JOB_\_PROGRESS_\vaccine\VaccineCheck All\VaccineCheckUp\VaccineCheckUp\Release\VaccineCheckUp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eaab135eacf3b0d79ba90f1239fef21a_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
eaab135eacf3b0d79ba90f1239fef21a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eaab135eacf3b0d79ba90f1239fef21a_JaffaCakes118
-
Size
336KB
-
MD5
eaab135eacf3b0d79ba90f1239fef21a
-
SHA1
02f61f09e8d1354985dc9c19b74682f93f77a8f6
-
SHA256
6f7c867985ffeeb6d51dabf6a84ab098711f1fcf7ef2501708fcf11c0091e647
-
SHA512
1cf4a7f007c34d5920b053919d4e549ce3e8531a4eb563593fdeb9b867f76742152500bfa1d4f63fa3e242a4c6298990497083526f006dfd31d2670a8908f071
-
SSDEEP
6144:esU5GmaNGPRz6yJGiGexpRb7XILIxQ1gd0UzEgCz:esU0maah6UGNOFw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eaab135eacf3b0d79ba90f1239fef21a_JaffaCakes118
Files
-
eaab135eacf3b0d79ba90f1239fef21a_JaffaCakes118.exe windows:4 windows x86 arch:x86
70d3a4e5b14b98f674d852039f87a82c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesA
GetFileTime
SetErrorMode
GetTickCount
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
RtlUnwind
ExitThread
CreateThread
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
GetOEMCP
IsBadWritePtr
QueryPerformanceCounter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GetCPInfo
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GlobalFlags
InterlockedIncrement
WritePrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
FreeResource
GlobalAddAtomA
InterlockedDecrement
SetLastError
MulDiv
FormatMessageA
lstrcpynA
LocalFree
GetCurrentThread
GetCurrentThreadId
GlobalDeleteAtom
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GetModuleHandleA
HeapAlloc
HeapFree
LoadLibraryA
GetProcAddress
FreeLibrary
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
GetPriorityClass
GetExitCodeProcess
TerminateProcess
CreateMutexA
ReleaseMutex
CreateDirectoryA
FindFirstFileA
FindClose
GetTempPathA
GetCurrentProcessId
WaitForSingleObject
TerminateThread
CloseHandle
ResumeThread
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
DeleteFileA
CopyFileA
GetModuleFileNameA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
VirtualFree
Sleep
user32
RegisterClipboardFormatA
PostThreadMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
EndPaint
BeginPaint
GrayStringA
DrawTextExA
TabbedTextOutA
GetDesktopWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
GetWindowTextLengthA
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetWindow
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
ValidateRect
MessageBoxA
IsWindowEnabled
UnhookWindowsHookEx
GetMenuState
GetMenuItemCount
TrackMouseEvent
OffsetRect
GetNextDlgGroupItem
ClientToScreen
WindowFromPoint
GetCapture
ReleaseCapture
SetCursor
DrawTextA
GetWindowDC
GetClassNameA
GetCursorPos
SetForegroundWindow
SetActiveWindow
GetSubMenu
GetMenuItemID
SystemParametersInfoA
LoadCursorA
MessageBeep
InvalidateRgn
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
KillTimer
LoadBitmapA
GetWindowLongA
GetSysColor
GetParent
SetCapture
DestroyMenu
wsprintfA
InvalidateRect
ReleaseDC
GetDC
DrawFocusRect
DrawEdge
SetRect
PtInRect
IsRectEmpty
CopyRect
GetLastActivePopup
FindWindowA
BringWindowToTop
RegisterWindowMessageA
IsWindow
PostMessageA
ScreenToClient
GetSystemMetrics
EnableWindow
LoadIconA
GetClientRect
GetWindowRect
IsIconic
SendMessageA
DrawIcon
PostQuitMessage
UnregisterClassA
CharUpperA
gdi32
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectA
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
StretchBlt
DeleteObject
GetStockObject
SelectObject
CreateCompatibleBitmap
BitBlt
CreateCompatibleDC
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
RegCloseKey
shell32
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
_TrackMouseEvent
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CLSIDFromString
CoRegisterMessageFilter
OleIsCurrentClipboard
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
OleFlushClipboard
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
oleaut32
OleCreateFontIndirect
SysAllocString
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysAllocStringByteLen
SysStringLen
SystemTimeToVariantTime
SysFreeString
urlmon
URLDownloadToFileA
gdiplus
GdiplusStartup
GdipCloneImage
GdipCreateHBITMAPFromBitmap
GdipFree
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipDisposeImage
GdipAlloc
GdiplusShutdown
wininet
InternetQueryDataAvailable
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetCheckConnectionA
InternetGetConnectedState
HttpQueryInfoA
InternetCrackUrlA
DeleteUrlCacheEntry
psapi
GetModuleFileNameExA
Sections
.text Size: 184KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ