G:\BuildAgent\work\cdc3d0ebfd4f8694\bin\Release\LittleInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7108c68a166c24f8f3c203f8e8fc99f3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7108c68a166c24f8f3c203f8e8fc99f3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7108c68a166c24f8f3c203f8e8fc99f3_JaffaCakes118
-
Size
958KB
-
MD5
7108c68a166c24f8f3c203f8e8fc99f3
-
SHA1
133e1b9ca959e82d5d870a15532e69faaaf0518c
-
SHA256
6465783fbefe12a66ed9639310abd48b800fddeb589380f16ebe9070438e64be
-
SHA512
3057d2ac8aabb4c51c3705b264cef4b85410a0091b32d23f0848a476dbb9f7fa4748b9ec3d46253a2e6d23e62751fac199aae5806b93a9528cbd025aa21cb78a
-
SSDEEP
12288:oIZLwDshZ2p6j2y4LcmXjxEL/hPKHvcXqFApycRpB9EF3J8Qv:PZ0S2p6KIE6LJEvcpyc3nEFuQv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7108c68a166c24f8f3c203f8e8fc99f3_JaffaCakes118
Files
-
7108c68a166c24f8f3c203f8e8fc99f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
85b2f0562a503c60155cdb1d94f29672
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
ExitProcess
RtlUnwind
HeapReAlloc
SetStdHandle
GetFileType
ExitThread
CreateThread
HeapSize
VirtualAlloc
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
TlsFree
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringW
ReleaseMutex
CreateMutexW
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
CreateEventW
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
lstrlenA
lstrcmpA
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
WriteFile
GetThreadLocale
GetFileTime
GetFileSize
GetFileAttributesW
FindFirstFileW
FindClose
GlobalAlloc
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
FreeLibrary
CompareStringW
LoadLibraryA
GetVersionExA
lstrcmpW
LocalAlloc
WideCharToMultiByte
ExpandEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
LeaveCriticalSection
InitializeCriticalSection
MoveFileExW
EnterCriticalSection
DeleteFileW
ReadFile
RaiseException
SetFilePointer
FlushFileBuffers
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetTempFileNameW
GetTempPathW
VerSetConditionMask
VerifyVersionInfoW
MapViewOfFile
CreateFileMappingW
GetFileSizeEx
CreateFileW
CopyFileW
CreateDirectoryW
OpenEventW
CloseHandle
CreateProcessW
MulDiv
GetTickCount
lstrlenW
GetUserDefaultUILanguage
MultiByteToWideChar
GetVersionExW
WaitForSingleObject
Sleep
GetModuleFileNameW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetUserDefaultLangID
GetLastError
GetProcAddress
LoadLibraryW
SetLastError
LocalHandle
GetModuleHandleW
FindResourceW
LoadResource
LockResource
SizeofResource
LocalFree
HeapDestroy
FormatMessageW
user32
DestroyMenu
GetMessageW
TranslateMessage
ValidateRect
CharUpperW
EndPaint
BeginPaint
MoveWindow
IsDialogMessageW
IsDlgButtonChecked
SetDlgItemTextW
CheckDlgButton
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetForegroundWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
DefWindowProcW
CallWindowProcW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
GetMenuState
RegisterClipboardFormatW
CheckMenuItem
ShowWindow
EnumThreadWindows
WaitForInputIdle
ClientToScreen
ScreenToClient
ReleaseCapture
SetCapture
KillTimer
SetTimer
InvalidateRect
ReleaseDC
GetDC
PtInRect
TrackMouseEvent
LoadCursorW
SetCursor
SetRectEmpty
GetClassNameW
GetDlgCtrlID
GetSysColorBrush
SetWindowTextW
EnumChildWindows
UnregisterClassW
FillRect
GetClientRect
IsWindowVisible
GetWindowThreadProcessId
MessageBoxW
MessageBeep
GetCursorPos
SetRect
IsWindow
GetParent
MapDialogRect
TranslateAcceleratorW
DestroyAcceleratorTable
EnableMenuItem
OffsetRect
GetWindowRect
AdjustWindowRectEx
CreateAcceleratorTableW
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetSystemMenu
LoadIconW
GetWindowLongW
SetWindowLongW
GetForegroundWindow
PostMessageW
AppendMenuW
PostQuitMessage
PostThreadMessageW
CloseWindow
GetWindow
SendMessageW
GetSysColor
IsRectEmpty
CopyRect
RedrawWindow
EnableWindow
UpdateWindow
UnregisterClassA
gdi32
GetStockObject
DeleteDC
DPtoLP
MoveToEx
LineTo
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SelectClipRgn
GetTextExtentExPointW
CreatePatternBrush
CreateCompatibleBitmap
BitBlt
SetBrushOrgEx
CreateCompatibleDC
GetDeviceCaps
Rectangle
GetTextMetricsW
CreatePen
CreateSolidBrush
PtVisible
Escape
ExtTextOutW
TextOutW
RectVisible
CreateFontIndirectW
GetObjectW
GetTextExtentPoint32W
CreateDIBSection
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegEnumKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegDeleteValueW
RegEnumValueW
RegCloseKey
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
shell32
ShellExecuteW
SHGetFolderPathW
Shell_NotifyIconW
comctl32
InitCommonControlsEx
shlwapi
UrlUnescapeW
PathAppendW
UrlEscapeA
AssocQueryStringW
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathFindExtensionW
PathFileExistsW
oledlg
OleUIBusyW
ole32
CoInitialize
CoUninitialize
StringFromGUID2
CoInitializeEx
CoCreateGuid
CoCreateInstance
CreateStreamOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantChangeType
SysFreeString
SysAllocString
VariantClear
VariantInit
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
msi
ord159
ord137
ord160
ord141
ord118
ord88
ord32
ord92
ord8
ord113
riched20
ord4
gdiplus
GdipFree
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreateBitmapFromHBITMAP
GdipDrawImageRectI
GdipCloneImage
GdipDisposeImage
GdiplusShutdown
GdiplusStartup
GdipAlloc
ws2_32
WSAStartup
oleacc
LresultFromObject
CreateStdAccessibleObject
wininet
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
HttpQueryInfoW
InternetQueryDataAvailable
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetOpenUrlW
InternetCloseHandle
InternetQueryOptionW
Sections
.text Size: 300KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 500KB - Virtual size: 498KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ