c:\Claim\Word\every\governskill.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2e97e1d360ffc5a0eb053be1405a4ae5_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
2e97e1d360ffc5a0eb053be1405a4ae5_JaffaCakes118
-
Size
295KB
-
MD5
2e97e1d360ffc5a0eb053be1405a4ae5
-
SHA1
6a3c7380cb0ad55598e0774e8e865387514aa250
-
SHA256
7f343116f1e00ec7383946710c46958228207eeada77f28452063cca23b38459
-
SHA512
05c9124c1f3b664e2bc0b319ca235b236776235d6fcee9c38d22cce8221daf4131c5c7dff8bb6e0e06aac9d27b4e1cc98976dc8f1f4293757efc8b441518d1cf
-
SSDEEP
6144:pOHufAfX3XBdWbEV2PT7OTtDLG6WKqRMY05TSTDazcydNl/XU:7adWbO2PT7ElLQnRP0BS6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2e97e1d360ffc5a0eb053be1405a4ae5_JaffaCakes118
Files
-
2e97e1d360ffc5a0eb053be1405a4ae5_JaffaCakes118.exe windows:5 windows x86 arch:x86
ca23ddd6f376024230b6feeba6e3243e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetVersionExA
lstrcmpW
LoadLibraryA
LoadLibraryW
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
GlobalFlags
WriteFile
SetFilePointer
FlushFileBuffers
GetCurrentProcess
GetModuleHandleA
HeapFree
HeapReAlloc
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
VirtualAlloc
SetHandleCount
GetStdHandle
GetFileType
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
lstrlenA
lstrcmpA
InterlockedIncrement
GetCurrentThreadId
CloseHandle
MultiByteToWideChar
FormatMessageW
lstrlenW
WideCharToMultiByte
GetCurrentProcessId
FreeLibrary
FindResourceW
LoadResource
LockResource
SizeofResource
InterlockedDecrement
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
TlsFree
GlobalFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalAlloc
GlobalHandle
GlobalUnlock
GlobalReAlloc
GlobalLock
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalFree
LocalAlloc
GetLastError
SetLastError
VirtualProtectEx
GetFileAttributesW
Sleep
GetProcessHeap
HeapAlloc
CreateProcessW
GetEnvironmentVariableW
user32
TabbedTextOutW
DrawTextExW
GrayStringW
PostQuitMessage
DefWindowProcW
DrawFrameControl
GetActiveWindow
ReleaseDC
GetClientRect
CreateWindowExW
GetClassInfoW
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
CallWindowProcW
GetMenu
SetWindowPos
ClientToScreen
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetWindowTextW
LoadCursorW
GetSystemMetrics
GetDC
GetSysColor
GetSysColorBrush
SetWindowsHookExW
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
SendMessageW
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
UnhookWindowsHookEx
AppendMenuW
GetWindowLongW
IsDialogMessageW
GetClassInfoExW
EnumWindows
CallNextHookEx
DrawTextW
PostMessageW
FillRect
TrackPopupMenu
DestroyMenu
SetWindowTextW
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
SetWindowLongW
RegisterClassW
gdi32
CreateBitmap
SetBkMode
ExcludeClipRect
LineTo
DeleteObject
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
GetStockObject
ExtTextOutW
SaveDC
RestoreDC
SetMapMode
PtVisible
RectVisible
TextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
comctl32
ImageList_SetDragCursorImage
CreatePropertySheetPageW
ImageList_LoadImageW
PropertySheetW
ole32
CoInitialize
CoRegisterSurrogate
OleUninitialize
OleInitialize
OleSetContainedObject
oleaut32
VariantChangeType
VariantClear
VariantInit
ws2_32
gethostbyname
getpeername
WSAStartup
recvfrom
htonl
htons
ntohs
getsockname
shutdown
setsockopt
sendto
WSACleanup
recv
socket
getservbyname
send
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ