D:\BuildAgent\work\b0d71a1a28f6c898\Release\Win32\Installer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118
-
Size
1.4MB
-
MD5
6fff42c279c27218020aa1d8119d3b2b
-
SHA1
49a6a5f7cf5d51a8253cefb978ccce8f0fc0e26b
-
SHA256
f7736a607d74279e4fe93e659b4f6443210c8f5b4b9a75f49ae009d5039d251f
-
SHA512
b94c36af8c3c12777c396d452d89ecc826d789bec8e265aadd0dc7b118fe0e7c36d41bc469d6418fab27507ae661511418bfe6c306d7be086299d64e9a6ef8ac
-
SSDEEP
12288:xrsgNPqIHfoF5Nrv66hifW4HIcwjXigKatzN/PCipBzvEQzjpLcvKM4ZvbG:Vsgthfse6hifWkF6i/4NhzvEmL0KVpi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118
Files
-
6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe windows:6 windows x86 arch:x86
b0dd025f55cd6382e2b5244618ea8f9e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdiplus
GdipCreateBitmapFromStream
GdipDrawImageI
GdipDrawImageRectI
GdiplusShutdown
GdiplusStartup
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromFile
GdipCloneImage
GdipDisposeImage
GdipFillPath
GdipFillRectangle
GdipDrawLine
GdipSetPathGradientCenterPointI
GdipSetPathGradientSurroundColorsWithCount
GdipGetPathGradientPointCount
GdipSetPathGradientCenterColor
GdipCreatePathGradientFromPath
GdipAddPathEllipse
GdipDeleteFont
GdipCreateFontFromDC
GdipMeasureString
GdipDrawString
GdipFillRectangleI
GdipDrawPath
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipAddPathArcI
GdipAddPathLineI
GdipClosePathFigure
GdipDeletePath
GdipCreatePath
GdipDeletePen
GdipCreatePen1
GdipCreateLineBrushFromRectI
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipAlloc
GdipFree
GdipGetImageHeight
GdipGetImageWidth
GdipSetPenColor
GdipSetLineColors
GdipSetSolidFillColor
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
winhttp
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpOpen
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpCloseHandle
WinHttpConnect
WinHttpOpenRequest
WinHttpWriteData
WinHttpReceiveResponse
WinHttpAddRequestHeaders
kernel32
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
GetProcAddress
GetModuleHandleW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetModuleHandleExW
GetLastError
FreeResource
MoveFileW
LocalAlloc
LocalFree
CopyFileW
GetTickCount
DeleteFileW
GetFileAttributesExW
CloseHandle
CreateFileW
ReadFile
FlushFileBuffers
GetFileSize
GetTempPathW
GetTempFileNameW
FindFirstFileW
FindNextFileW
FindClose
CreateThread
GetModuleFileNameW
CreateDirectoryW
HeapSize
WriteFile
GlobalUnlock
SetEvent
WaitForSingleObject
TerminateThread
InitializeCriticalSectionEx
DeleteCriticalSection
CreateEventW
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
GetVersionExW
GetCurrentProcess
ExpandEnvironmentStringsW
GetFileAttributesW
GetVersion
SetLastError
SetFilePointer
Sleep
OpenProcess
TerminateProcess
LoadLibraryW
WaitForMultipleObjects
GlobalFree
GetCurrentThreadId
GetExitCodeProcess
GetFileSizeEx
FreeLibrary
IsWow64Process
GlobalAlloc
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
MoveFileExW
GetNativeSystemInfo
GetUserDefaultUILanguage
GetLocalTime
RaiseException
DecodePointer
GetFirmwareEnvironmentVariableW
FileTimeToDosDateTime
SystemTimeToFileTime
FileTimeToSystemTime
GetFileType
DuplicateHandle
GetFileInformationByHandle
GetSystemTime
HeapDestroy
SetEnvironmentVariableA
ReadConsoleW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LoadLibraryExA
InitializeCriticalSectionAndSpinCount
GetStringTypeW
EncodePointer
InterlockedCompareExchange
OutputDebugStringW
SetCriticalSectionSpinCount
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineW
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
IsValidCodePage
GetACP
GetOEMCP
GetStdHandle
GetTimeZoneInformation
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GlobalLock
LoadLibraryExW
user32
EndPaint
BeginPaint
GetPropW
SetPropW
PostMessageW
DrawFocusRect
GetDialogBaseUnits
GetSysColor
ExitWindowsEx
GetKeyState
GetDesktopWindow
GetDC
MessageBoxW
InvalidateRect
ScreenToClient
GetWindowRect
ShowWindow
GetDlgItem
SetWindowLongW
CallWindowProcW
HideCaret
SendMessageW
DestroyWindow
RegisterWindowMessageW
EnableWindow
GetWindowThreadProcessId
GetForegroundWindow
AttachThreadInput
TrackMouseEvent
GetClientRect
IsWindowEnabled
GetParent
IsWindow
DefWindowProcW
ReleaseDC
DialogBoxParamW
CreateDialogParamW
GetWindowLongW
GetWindowDC
SetDlgItemTextW
GetCursorPos
SetTimer
SetWindowTextW
KillTimer
SetFocus
LoadImageW
SetWindowPos
GetSystemMetrics
BringWindowToTop
GetWindow
LoadCursorW
SetCursor
EndDialog
SendDlgItemMessageW
gdi32
StretchBlt
SetBrushOrgEx
SetBkMode
GetStockObject
GetObjectW
CreatePatternBrush
CreateFontIndirectW
EnumFontFamiliesExW
DeleteObject
ExtTextOutW
GetTextMetricsW
SetBkColor
SetTextColor
DeleteDC
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
advapi32
RegDeleteTreeW
OpenServiceW
CloseServiceHandle
CryptGetHashParam
GetUserNameW
LookupAccountSidW
CryptEncrypt
CryptGenKey
CryptExportKey
RegDeleteKeyW
QueryServiceStatus
ControlService
RegLoadKeyW
CryptAcquireContextW
CryptImportKey
CryptGetKeyParam
CryptCreateHash
CryptHashData
CryptVerifySignatureW
CryptDestroyHash
CryptDestroyKey
CryptReleaseContext
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegOpenKeyW
OpenSCManagerW
RegDeleteKeyExW
RegDeleteValueW
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetFileSecurityW
FreeSid
OpenProcessToken
RegEnumKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
shell32
ShellExecuteW
Shell_NotifyIconW
ShellExecuteExW
SHGetFolderPathW
ole32
CoSetProxyBlanket
CoTaskMemFree
CoInitialize
CoCreateInstance
CoInitializeSecurity
CoUninitialize
CoInitializeEx
GetHGlobalFromStream
CreateStreamOnHGlobal
StringFromCLSID
CoCreateGuid
oleaut32
SysStringLen
VariantClear
VariantInit
SysFreeString
SysAllocString
OleCreatePictureIndirect
SysStringByteLen
SysAllocStringByteLen
VariantChangeType
SysAllocStringLen
shlwapi
PathRemoveFileSpecW
PathFindExtensionW
PathRemoveExtensionW
PathFindFileNameW
PathAddBackslashW
PathStripPathW
PathAppendW
PathFileExistsW
SHCopyKeyW
StrToIntExW
psapi
EnumProcesses
GetModuleFileNameExW
uxtheme
SetWindowTheme
crypt32
CryptDecodeObjectEx
CryptStringToBinaryW
Sections
.text Size: 410KB - Virtual size: 410KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 798KB - Virtual size: 797KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ