d:\Source\LittleInstaller\bin\Release\LittleInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
366ff00353ea9093a31235cc0e23c3d6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
366ff00353ea9093a31235cc0e23c3d6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
366ff00353ea9093a31235cc0e23c3d6_JaffaCakes118
-
Size
914KB
-
MD5
366ff00353ea9093a31235cc0e23c3d6
-
SHA1
8d4c7a35b2cea5502e6d4c772814ed8ea63943a2
-
SHA256
1732a7165e50b9deaaa51123c9351e770c420a9258607b72b5c0ce327028e742
-
SHA512
d1902ef1dc715ad23a6dde5b37aacbd1949499f7765e7d829e6f708644246bd21ad473e5e9a0d35575a17b3bb77993af54c66c43e0e6925c4383accc95212a01
-
SSDEEP
12288:rI6YqU1JmxuLEttOEKOxpGszbM90m4TqFAXWlPXpfI:MgU1UEE6Rszbg0m4TW1XRI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 366ff00353ea9093a31235cc0e23c3d6_JaffaCakes118
Files
-
366ff00353ea9093a31235cc0e23c3d6_JaffaCakes118.exe windows:4 windows x86 arch:x86
deea9c83151310d5b8f5ca96189453cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
ExitProcess
RtlUnwind
HeapReAlloc
ExitThread
CreateThread
SetStdHandle
GetFileType
HeapSize
VirtualAlloc
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
GlobalFlags
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
WriteFile
GetThreadLocale
GetFileTime
GetFileSize
GetFileAttributesW
FindFirstFileW
FindClose
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
WritePrivateProfileStringW
CreateEventW
ReleaseMutex
CreateMutexW
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
lstrlenA
lstrcmpA
GlobalAlloc
GetModuleHandleA
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
FreeLibrary
CompareStringW
LoadLibraryA
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
CopyFileW
CreateDirectoryW
OpenEventW
GetTickCount
GetUserDefaultUILanguage
InterlockedDecrement
InterlockedIncrement
MulDiv
LoadLibraryW
GetProcAddress
WideCharToMultiByte
SetLastError
VerSetConditionMask
VerifyVersionInfoW
GetFileSizeEx
MapViewOfFile
CreateFileMappingW
WaitForSingleObject
Sleep
GetVersionExW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetUserDefaultLangID
LocalHandle
ExpandEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MoveFileExW
DeleteFileW
ReadFile
GetModuleFileNameW
GetLastError
SetFilePointer
FlushFileBuffers
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
RaiseException
GetTempFileNameW
GetModuleHandleW
GetTempPathW
MultiByteToWideChar
lstrcmpW
LocalAlloc
lstrlenW
CloseHandle
CreateProcessW
SizeofResource
LocalFree
FormatMessageW
FindResourceW
LoadResource
HeapDestroy
LockResource
user32
RegisterClipboardFormatW
CharUpperW
GetMessageW
TranslateMessage
ValidateRect
DestroyMenu
EndPaint
BeginPaint
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
CheckMenuItem
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetForegroundWindow
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowTextW
GetFocus
SetFocus
MoveWindow
IsDialogMessageW
IsDlgButtonChecked
SetDlgItemTextW
SendDlgItemMessageW
CheckDlgButton
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
ClientToScreen
ScreenToClient
ReleaseCapture
SetCapture
KillTimer
SetTimer
InvalidateRect
ReleaseDC
GetDC
SetRectEmpty
PtInRect
TrackMouseEvent
LoadCursorW
SetCursor
GetSysColorBrush
SetWindowTextW
EnumChildWindows
GetClassNameW
GetDlgCtrlID
IsWindowVisible
FillRect
GetClientRect
GetCursorPos
IsWindow
OffsetRect
TranslateAcceleratorW
SetWindowLongW
UnregisterClassW
RegisterClassW
EnableMenuItem
AdjustWindowRectEx
CreateAcceleratorTableW
SetRect
MapDialogRect
MessageBeep
DestroyAcceleratorTable
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
CopyRect
GetSysColor
IsRectEmpty
PostQuitMessage
RedrawWindow
GetWindowRect
SetWindowPos
GetWindowLongW
GetWindowThreadProcessId
PostThreadMessageW
MessageBoxW
GetSystemMenu
LoadIconW
SendMessageW
PostMessageW
GetForegroundWindow
AppendMenuW
CloseWindow
GetWindow
EnumThreadWindows
WaitForInputIdle
GetParent
ShowWindow
EnableWindow
GetWindowTextLengthW
UnregisterClassA
gdi32
DeleteDC
GetStockObject
DPtoLP
SetMapMode
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
MoveToEx
GetTextExtentPoint32W
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
SelectClipRgn
GetTextExtentExPointW
CreateCompatibleBitmap
BitBlt
SetBrushOrgEx
CreateCompatibleDC
CreatePatternBrush
GetDeviceCaps
GetTextMetricsW
Rectangle
CreatePen
CreateSolidBrush
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
CreateFontIndirectW
GetObjectW
DeleteObject
CreateDIBSection
LineTo
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegCloseKey
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
RegDeleteValueW
RegEnumValueW
RegSetValueExW
RegCreateKeyExW
shell32
SHGetFolderPathW
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
UrlEscapeA
PathAppendW
PathFileExistsW
PathFindFileNameW
PathFindExtensionW
PathStripToRootW
UrlUnescapeW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoCreateGuid
StringFromGUID2
CoInitialize
CoUninitialize
CoCreateInstance
CreateStreamOnHGlobal
CoInitializeEx
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantChangeType
VariantInit
VariantClear
SysAllocString
SysFreeString
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
riched20
ord4
gdiplus
GdipFree
GdiplusShutdown
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreateBitmapFromHBITMAP
GdipDrawImageRectI
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdiplusStartup
msi
ord8
ord137
ord141
ord113
ord160
ord118
ord88
ord32
ord92
ord159
ws2_32
WSAStartup
wininet
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
HttpQueryInfoW
InternetQueryDataAvailable
InternetQueryOptionW
InternetCanonicalizeUrlW
InternetCrackUrlW
InternetOpenUrlW
Sections
.text Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512KB - Virtual size: 508KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ