C:\Users\Dariusz\Documents\Visual Studio 2015\Projects\to\Release\to.pdb
Static task
static1
Behavioral task
behavioral1
Sample
753ae9c26c84a5d49ffc7e9051d78b06_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
753ae9c26c84a5d49ffc7e9051d78b06_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
753ae9c26c84a5d49ffc7e9051d78b06_JaffaCakes118
-
Size
1.9MB
-
MD5
753ae9c26c84a5d49ffc7e9051d78b06
-
SHA1
4b6cc089fa5d55161321bf0651d70b79a001842f
-
SHA256
d3db28d70ecb117d9feab5e4e51d745546cd279c81d4450d9ce6e8eb5f7c0600
-
SHA512
e9e6d3098954b9acc9ccdec680d1f919e914029524643fb86c90d0b5fc0c3bc4b34a6f8232da3a235438e166b3726c167a53b252f61695dfa54b92998f230797
-
SSDEEP
49152:MWB1VxyKzwZGvHUKnwhQZVgqPiAV1L+Q+MTO89uFo8Ns6ICWtVUBOSu/nKs3P7gp:/xyKzwZ6LfjHnrHiRz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 753ae9c26c84a5d49ffc7e9051d78b06_JaffaCakes118
Files
-
753ae9c26c84a5d49ffc7e9051d78b06_JaffaCakes118.exe windows:5 windows x86 arch:x86
a2573d3d2859e699b921b1c5dfda4a43
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
ord176
PathRemoveFileSpecW
comctl32
ord14
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
kernel32
CreateFileMappingW
MapViewOfFile
OpenThread
OpenProcess
Sleep
LoadLibraryW
FreeLibrary
GetCurrentProcess
InitializeCriticalSection
CreateMutexW
GetCurrentThreadId
GetVersionExW
Process32NextW
Process32FirstW
GetNativeSystemInfo
MoveFileExW
DeleteCriticalSection
WideCharToMultiByte
GetSystemTime
GetTickCount
IsWow64Process
SetUnhandledExceptionFilter
CreateProcessW
HeapSize
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetProcessHeap
GetTimeZoneInformation
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
ReadConsoleW
GetFileType
GetConsoleMode
GetConsoleCP
GetACP
GetStdHandle
GetModuleFileNameA
ExitProcess
HeapReAlloc
HeapFree
HeapAlloc
GetModuleHandleExW
ResumeThread
ExitThread
RaiseException
RtlUnwind
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
GlobalLock
InterlockedPushEntrySList
InterlockedPopEntrySList
GlobalAlloc
GetThreadTimes
VirtualProtect
VirtualFree
VirtualAlloc
LoadLibraryExW
FreeLibraryAndExitThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SwitchToThread
SignalObjectAndWait
FormatMessageA
LocalFree
AreFileApisANSI
DeviceIoControl
SetFilePointerEx
SetEndOfFile
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
GetCurrentThread
GetCurrentProcessId
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
InitializeSListHead
WaitForSingleObjectEx
ResetEvent
SetEvent
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
QueryPerformanceFrequency
TryEnterCriticalSection
QueryPerformanceCounter
GetCPInfo
DecodePointer
ReadProcessMemory
GetWindowsDirectoryW
UnmapViewOfFile
CreateFileW
Thread32First
Thread32Next
WriteFile
ReadFile
CreateDirectoryW
MulDiv
VirtualFreeEx
Module32NextW
CreateRemoteThread
VirtualAllocEx
GetProcAddress
Module32FirstW
CloseHandle
GetLastError
GetExitCodeThread
CreateToolhelp32Snapshot
GetModuleHandleA
WaitForSingleObject
GetProcessId
WriteProcessMemory
GetModuleFileNameW
LeaveCriticalSection
GlobalUnlock
EnterCriticalSection
VerifyVersionInfoW
DuplicateHandle
VerSetConditionMask
MultiByteToWideChar
GetModuleHandleW
ReleaseSemaphore
WriteConsoleW
GetStringTypeW
InterlockedFlushSList
EncodePointer
user32
CloseClipboard
GetWindowTextW
GetDlgItem
SetWindowTextW
EnableWindow
GetParent
EqualRect
GetLastInputInfo
CheckDlgButton
GetSysColorBrush
GetMessageW
GetWindow
SendMessageTimeoutW
MonitorFromRect
MonitorFromWindow
DispatchMessageW
SetTimer
IsDialogMessageW
GetDlgCtrlID
AttachThreadInput
IsWindowEnabled
IntersectRect
TranslateMessage
PostQuitMessage
IsIconic
GetGUIThreadInfo
SendInput
GetWindowThreadProcessId
IsWindowVisible
UnhookWindowsHookEx
SetWindowsHookExW
TrackMouseEvent
PtInRect
EndDialog
GetSystemMetrics
GetDlgItemTextW
GetWindowDC
GetDesktopWindow
DialogBoxParamW
GetKeyState
GetFocus
MapVirtualKeyW
CheckRadioButton
CreatePopupMenu
TrackPopupMenu
GetKeyboardState
GetMonitorInfoW
GetWindowTextA
SetWindowTextA
SetMenuDefaultItem
EnumWindows
DestroyMenu
EnumDisplayDevicesW
InsertMenuW
GetDlgItemInt
MapDialogRect
GetKeyNameTextW
LoadImageW
GetLayeredWindowAttributes
SetLayeredWindowAttributes
UpdateLayeredWindow
GetForegroundWindow
SetForegroundWindow
OpenClipboard
GetSysColor
EmptyClipboard
SetClipboardData
FindWindowExW
GetPropW
CopyRect
SetPropW
CallWindowProcW
PostMessageW
GetDC
ReleaseDC
GetWindowLongW
CreateDialogParamW
DefWindowProcW
InflateRect
EnumChildWindows
EnumDisplayMonitors
FillRect
CreateWindowExW
RegisterClassExW
ShowWindow
IsWindow
OffsetRect
MapWindowPoints
SetFocus
LoadIconW
FindWindowW
LoadCursorW
SetCapture
SetCursor
SetWindowLongW
DrawTextW
UpdateWindow
ReleaseCapture
InvalidateRect
BeginPaint
EndPaint
DeferWindowPos
GetWindowRect
SetWindowPos
ScreenToClient
WindowFromPoint
BeginDeferWindowPos
ClientToScreen
GetClassNameW
EndDeferWindowPos
GetClientRect
SystemParametersInfoW
SetCursorPos
GetCursorPos
GetWindowTextLengthW
DestroyWindow
MessageBoxW
SendMessageW
IsDlgButtonChecked
SetDlgItemInt
gdi32
GetCharABCWidthsW
GetObjectW
CreateFontIndirectW
StretchBlt
LineTo
CreatePen
MoveToEx
Ellipse
SetStretchBltMode
RoundRect
GetDeviceCaps
GetTextExtentPoint32W
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
CreateFontW
GetStockObject
Polyline
DeleteDC
SetTextColor
Rectangle
Polygon
SetBkColor
DeleteObject
CreateSolidBrush
GetCurrentObject
comdlg32
ChooseColorW
ChooseFontW
advapi32
GetTokenInformation
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
shell32
SHGetFolderPathW
ShellExecuteW
Shell_NotifyIconW
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
SysAllocString
psapi
EnumProcessModules
GetModuleBaseNameW
GetModuleFileNameExW
dbghelp
ImageNtHeader
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 254KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ