c:\face\Lay\Clear\pointpresent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
808615a64ee4bf4cdb4d9d34eb29b0ef_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
808615a64ee4bf4cdb4d9d34eb29b0ef_JaffaCakes118
-
Size
547KB
-
MD5
808615a64ee4bf4cdb4d9d34eb29b0ef
-
SHA1
f9bba8e3c949b29a16825547c67f7e77f346dcf5
-
SHA256
b8372f8b7dc2f7b249fcdd8fd59e8f3e8fd719c581dfe1940a79918b06c6cf74
-
SHA512
28beeec7fb1664c150a56f9935ae444bbed00f0aadc4bd4d575e322c5fbff9df458d7dc182705a20c1435209818103842cc0620e855889fb7b1eedbb7531c01a
-
SSDEEP
6144:uVJt7IsATy65KJZnF/gYdpOLwgF/lauaS7tsPUF18avHUwAIgJ+ke:uFTM5utF/tdpm37tKO6asJIgJt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 808615a64ee4bf4cdb4d9d34eb29b0ef_JaffaCakes118
Files
-
808615a64ee4bf4cdb4d9d34eb29b0ef_JaffaCakes118.exe windows:5 windows x86 arch:x86
4a25305c61bf8250b604f3cdb9f470f6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RaiseException
VirtualAlloc
HeapReAlloc
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
CompareStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
lstrcmpA
GlobalGetAtomNameA
InterlockedIncrement
GetModuleHandleW
CompareStringA
GetCurrentThreadId
CloseHandle
FormatMessageA
MultiByteToWideChar
lstrlenA
GetCurrentProcessId
GetModuleFileNameA
FreeLibrary
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedDecrement
GetModuleHandleA
GetProcAddress
TlsFree
GlobalFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalAlloc
GlobalHandle
GlobalUnlock
GlobalReAlloc
GlobalLock
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalFree
LocalAlloc
GetLastError
SetLastError
GetCurrentDirectoryA
Sleep
VirtualProtect
SetFileAttributesA
CreateProcessA
LoadLibraryA
WaitForSingleObject
RtlUnwind
DeviceIoControl
user32
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowTextA
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
UnhookWinEvent
InflateRect
SetParent
EndDeferWindowPos
PostQuitMessage
ExitWindowsEx
IntersectRect
MapVirtualKeyA
GetScrollPos
SetTimer
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ClientToScreen
SetWindowTextA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
IsIconic
SetForegroundWindow
comctl32
ImageList_SetOverlayImage
DestroyPropertySheetPage
CreateToolbarEx
ord6
ImageList_Destroy
ImageList_LoadImageA
ord17
comdlg32
GetOpenFileNameA
GetSaveFileNameA
FindTextA
ole32
OleInitialize
OleSetContainedObject
OleUninitialize
oleaut32
VariantChangeType
VariantClear
VariantInit
oleacc
GetOleaccVersionInfo
AccessibleObjectFromPoint
CreateStdAccessibleObject
LresultFromObject
gdi32
SaveDC
ExtTextOutA
DeleteObject
GetDeviceCaps
CreateBitmap
GetClipBox
SetTextColor
RestoreDC
SetMapMode
PtVisible
RectVisible
TextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetBkColor
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
Sections
.text Size: 318KB - Virtual size: 318KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ