d:\Dev\LittleInstaller\bin\Release\LittleInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f457b3b5d50b6408434a187eccdfea18_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f457b3b5d50b6408434a187eccdfea18_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f457b3b5d50b6408434a187eccdfea18_JaffaCakes118
-
Size
722KB
-
MD5
f457b3b5d50b6408434a187eccdfea18
-
SHA1
baa8e82994c5283a97ffebbb7f63ac375842152b
-
SHA256
201b1758fa4b5433ea1a3284b376d020ffb5f4b57fa161ae719d8940270f75d9
-
SHA512
c5eba5f4a5c0536d45e793bdd31fcf93db9734b55c0a5902aef6fadbfa43ea76977753fac0b37e3a1ee46cd42afbc730b3d580b8112323bc64dc8079d022b9b8
-
SSDEEP
12288:9rLd7zrUw6JBdslmM3a3UtTzOOyrmxnP+Oqf6ZOQgwgOfyZNetKWokn:9JUFBAnK3UNOOuk2Ff6oQWOfy2nn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f457b3b5d50b6408434a187eccdfea18_JaffaCakes118
Files
-
f457b3b5d50b6408434a187eccdfea18_JaffaCakes118.exe windows:4 windows x86 arch:x86
cdefb9059807d311a5f27af37a7f199e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
ExitProcess
HeapReAlloc
GetSystemTimeAsFileTime
RaiseException
RtlUnwind
ExitThread
CreateThread
SetStdHandle
GetFileType
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
VirtualAlloc
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
SetErrorMode
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
WritePrivateProfileStringW
ReleaseMutex
CreateMutexW
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
CreateEventW
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
WriteFile
GetFileTime
GetFileSize
GetFileAttributesW
FindFirstFileW
FindClose
lstrcmpA
GlobalAlloc
GetModuleHandleA
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
FreeLibrary
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
CopyFileW
CreateDirectoryW
GetTickCount
MoveFileW
InterlockedDecrement
InterlockedIncrement
MulDiv
LoadLibraryW
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
GetThreadLocale
SetLastError
GetProcAddress
VerSetConditionMask
VerifyVersionInfoW
MapViewOfFile
CreateFileMappingW
GetFileSizeEx
WaitForSingleObject
Sleep
GetVersionExW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetUserDefaultLangID
LocalHandle
GetTempPathW
DeleteFileW
ReadFile
GetModuleHandleW
GetLastError
GetModuleFileNameW
SetFilePointer
FlushFileBuffers
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
GetTempFileNameW
ExpandEnvironmentStringsW
lstrlenW
CloseHandle
CreateProcessW
SizeofResource
LocalFree
FormatMessageW
FindResourceW
LoadResource
TerminateProcess
LockResource
user32
GetMessageW
TranslateMessage
ValidateRect
CharUpperW
DestroyMenu
EndPaint
BeginPaint
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetMenuState
CheckMenuItem
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetForegroundWindow
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowTextLengthW
GetWindowTextW
GetFocus
SetWindowPos
SetFocus
MoveWindow
IsDialogMessageW
IsDlgButtonChecked
SetDlgItemTextW
SendDlgItemMessageW
CheckDlgButton
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
EnableWindow
SendMessageW
UnregisterClassA
UnregisterClassW
IsWindowEnabled
GetNextDlgTabItem
EndDialog
ClientToScreen
ScreenToClient
ReleaseCapture
SetCapture
KillTimer
SetTimer
InvalidateRect
ReleaseDC
GetDC
SetRectEmpty
PtInRect
TrackMouseEvent
LoadCursorW
SetCursor
SetWindowTextW
EnumChildWindows
GetWindowLongW
GetClassNameW
GetDlgCtrlID
IsWindowVisible
GetSysColorBrush
RegisterClassW
GetParent
WaitForInputIdle
EnumThreadWindows
GetWindow
CloseWindow
ShowWindow
PostMessageW
GetSystemMenu
LoadIconW
AppendMenuW
GetForegroundWindow
PostThreadMessageW
GetWindowThreadProcessId
MessageBoxW
RedrawWindow
PostQuitMessage
CopyRect
IsRectEmpty
GetSysColor
FillRect
GetClientRect
GetCursorPos
IsWindow
DestroyAcceleratorTable
OffsetRect
TranslateAcceleratorW
GetWindowRect
SetWindowLongW
EnableMenuItem
AdjustWindowRectEx
CreateAcceleratorTableW
SetRect
MessageBeep
MapDialogRect
DrawTextW
TabbedTextOutW
GrayStringW
DrawTextExW
ModifyMenuW
gdi32
DeleteDC
GetStockObject
DPtoLP
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetObjectW
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
SelectClipRgn
GetTextExtentExPointW
SetBrushOrgEx
CreateCompatibleDC
CreatePatternBrush
CreateCompatibleBitmap
BitBlt
GetDeviceCaps
CreatePen
CreateSolidBrush
GetTextMetricsW
Rectangle
ExtTextOutW
TextOutW
RectVisible
PtVisible
Escape
DeleteObject
CreateDIBSection
CreateFontIndirectW
MoveToEx
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegCloseKey
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
shell32
SHGetFolderPathW
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsW
PathAppendW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
UrlEscapeA
PathFindFileNameW
UrlUnescapeW
ole32
CoInitializeEx
CoUninitialize
oleaut32
VariantInit
VariantClear
VariantChangeType
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
riched20
ord4
gdiplus
GdipAlloc
GdiplusStartup
GdiplusShutdown
GdipFree
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreateBitmapFromHBITMAP
GdipDrawImageRectI
GdipDisposeImage
GdipCloneImage
msi
ord160
ord113
ord141
ord137
ord88
ord8
ord92
ord32
ord159
ord118
ws2_32
WSAStartup
wininet
HttpOpenRequestW
InternetOpenUrlW
InternetConnectW
HttpSendRequestW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetCanonicalizeUrlW
InternetQueryOptionW
InternetCrackUrlW
InternetGetLastResponseInfoW
InternetCloseHandle
HttpQueryInfoW
InternetQueryDataAvailable
Sections
.text Size: 292KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 324KB - Virtual size: 322KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ