E:\BuildAgent\work\cdc3d0ebfd4f8694\bin\Release\LittleInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
71013da9d561d2e16f9010c26a904d0b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
71013da9d561d2e16f9010c26a904d0b_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
71013da9d561d2e16f9010c26a904d0b_JaffaCakes118
-
Size
938KB
-
MD5
71013da9d561d2e16f9010c26a904d0b
-
SHA1
4da7712fc6736f49b2ae2a3a13e84505777c563a
-
SHA256
2b4752d40cef0eb93fba7006d3f3e1e1919cea4d6e1060f1b465c2964ab0b8f8
-
SHA512
40577e5c95b9b7fd03dd6c6eb08a138b755541a8564831af6cbe54fb4c5e33fcfd6ec4d888824db1bfe0a1ae3d8888638b9666c3604191fabe180922b270c3d6
-
SSDEEP
12288:pHwvQ2XK9Vh8j/hKX/tXKTYvnqFo78CcCUKmuu:C4gdK1kYvb8C5R7u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 71013da9d561d2e16f9010c26a904d0b_JaffaCakes118
Files
-
71013da9d561d2e16f9010c26a904d0b_JaffaCakes118.exe windows:4 windows x86 arch:x86
d5584dc84bb5aa233ec218f798014fe1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TlsFree
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
ExitProcess
HeapReAlloc
RtlUnwind
SetStdHandle
GetFileType
ExitThread
CreateThread
HeapSize
VirtualAlloc
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
LocalReAlloc
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringW
ReleaseMutex
CreateMutexW
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
CreateEventW
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
lstrcmpA
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
WriteFile
GetThreadLocale
GetFileTime
GetFileAttributesW
FindFirstFileW
FindClose
GetModuleHandleA
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
FreeLibrary
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
FreeResource
GlobalAlloc
GlobalFree
lstrlenA
LocalAlloc
FindResourceExW
GetFileSize
CreateFileMappingW
MapViewOfFileEx
UnmapViewOfFile
GetFileSizeEx
WideCharToMultiByte
ExpandEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
LeaveCriticalSection
InitializeCriticalSection
MoveFileExW
EnterCriticalSection
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
DeleteFileW
RaiseException
ReadFile
SetFilePointer
FlushFileBuffers
GetCurrentProcess
VerSetConditionMask
VerifyVersionInfoW
CopyFileW
CreateDirectoryW
MultiByteToWideChar
GetTickCount
GetTempFileNameW
GetTempPathW
CloseHandle
OpenEventW
CreateProcessW
lstrlenW
GetUserDefaultUILanguage
MulDiv
GetVersionExW
WaitForSingleObject
Sleep
FileTimeToLocalFileTime
FileTimeToSystemTime
GetUserDefaultLangID
GetModuleFileNameW
GetProcAddress
LoadLibraryW
SetLastError
LocalHandle
GetModuleHandleW
GetLastError
FormatMessageW
FindResourceW
LoadResource
LockResource
SizeofResource
SetHandleCount
LocalFree
user32
DestroyMenu
GetMessageW
TranslateMessage
ValidateRect
CharUpperW
EndPaint
BeginPaint
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetForegroundWindow
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowTextW
SetWindowPos
SetFocus
MoveWindow
IsDialogMessageW
IsDlgButtonChecked
SetDlgItemTextW
SendDlgItemMessageW
CheckDlgButton
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
RegisterClipboardFormatW
GetMenuState
CheckMenuItem
EnumThreadWindows
WaitForInputIdle
ShowWindow
KillTimer
SetTimer
InvalidateRect
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
ReleaseCapture
SetCapture
PtInRect
TrackMouseEvent
LoadCursorW
SetCursor
SetRectEmpty
GetClassNameW
GetDlgCtrlID
GetSysColorBrush
SetWindowTextW
UnregisterClassW
EnumChildWindows
FillRect
GetClientRect
IsWindowVisible
MessageBoxW
GetWindowThreadProcessId
DestroyAcceleratorTable
GetParent
TranslateAcceleratorW
OffsetRect
EnableMenuItem
AdjustWindowRectEx
CreateAcceleratorTableW
SetRect
MessageBeep
MapDialogRect
GetCursorPos
IsWindow
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetForegroundWindow
PostMessageW
AppendMenuW
GetSystemMenu
LoadIconW
GetWindowLongW
SetWindowLongW
PostQuitMessage
PostThreadMessageW
GetWindow
CloseWindow
GetSysColor
IsRectEmpty
CopyRect
RedrawWindow
GetWindowRect
SendMessageW
EnableWindow
GetWindowTextLengthW
UnregisterClassA
gdi32
GetStockObject
DPtoLP
DeleteDC
MoveToEx
LineTo
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
CreateDIBSection
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SelectClipRgn
GetTextExtentExPointW
CreateCompatibleBitmap
BitBlt
SetBrushOrgEx
CreateCompatibleDC
CreatePatternBrush
GetDeviceCaps
CreatePen
CreateSolidBrush
GetTextMetricsW
Rectangle
ExtTextOutW
TextOutW
RectVisible
PtVisible
Escape
GetObjectW
CreateFontIndirectW
GetTextExtentPoint32W
DeleteObject
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegEnumKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegDeleteValueW
RegEnumValueW
RegCloseKey
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
shell32
ShellExecuteW
SHGetFolderPathW
CommandLineToArgvW
Shell_NotifyIconW
comctl32
InitCommonControlsEx
shlwapi
PathAppendW
UrlEscapeA
SHCreateStreamOnFileEx
AssocQueryStringW
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathFindExtensionW
PathFileExistsW
oledlg
OleUIBusyW
ole32
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoInitialize
CoUninitialize
StringFromGUID2
CoInitializeEx
CoCreateGuid
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
VariantChangeType
SysStringLen
SysAllocStringLen
LoadTypeLi
SysFreeString
VariantInit
SysAllocString
VariantClear
LoadRegTypeLi
winhttp
WinHttpReadData
WinHttpGetProxyForUrl
WinHttpDetectAutoProxyConfigUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpConnect
WinHttpOpen
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpQueryHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpOpenRequest
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
msi
ord88
ord137
ord160
ord141
ord118
ord159
ord32
ord92
ord113
ord8
riched20
ord4
gdiplus
GdipCloneImage
GdipDrawImageRectI
GdipCreateFromHDC
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipDisposeImage
GdiplusShutdown
GdiplusStartup
GdipFree
GdipDeleteGraphics
ws2_32
WSAStartup
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 324KB - Virtual size: 323KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 444KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ