E:\Projects\MantheClicker\MantheClicker\x64\Release\MantheClicker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8e6a401c8066e0c737532691071451bc_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8e6a401c8066e0c737532691071451bc_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
8e6a401c8066e0c737532691071451bc_JaffaCakes118
-
Size
5.7MB
-
MD5
8e6a401c8066e0c737532691071451bc
-
SHA1
1c862572b6dc46537ce31b043ee8c9bb20e45798
-
SHA256
02d7a6995854f314c194b90bc92c7f4cba4e93ef2999682e9cc37a9e6dcf19e4
-
SHA512
de57e19974f43a05668270e4a297ec4c44c139396e30b7d0580ff1f11174fd0acfe2c2cefe167ce87ed373491f1a876a4e08cc19cb9133ddada263cdd68f366b
-
SSDEEP
98304:sobxbouU/A7p+sjOK4j5wF5j9LApQfSBV0zXS8oy:vwA7BqK4j5c6pqAV07Cy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e6a401c8066e0c737532691071451bc_JaffaCakes118
Files
-
8e6a401c8066e0c737532691071451bc_JaffaCakes118.exe windows:6 windows x64 arch:x64
3056f6705b01b58b0ee151bf9eca8cd5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
opengl32
glDeleteTextures
glTexImage2D
glPixelStorei
glTexParameteri
glGenTextures
glPopAttrib
glPopMatrix
glDisableClientState
glDrawElements
glScissor
glBindTexture
glColorPointer
glTexCoordPointer
glVertexPointer
glOrtho
glLoadIdentity
glPushMatrix
glMatrixMode
glPolygonMode
glEnableClientState
glDisable
glBlendFunc
glEnable
glPushAttrib
glGetIntegerv
glClear
glClearColor
glViewport
kernel32
CreateFileA
FindClose
ReadFile
SetFilePointer
GetModuleFileNameA
CreateProcessA
GetLastError
GetFileSize
VirtualAlloc
VirtualAllocEx
WaitForSingleObject
VirtualFree
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetModuleHandleW
GetConsoleWindow
FreeConsole
SetPriorityClass
GetCurrentProcess
FindNextFileA
DeleteFileA
K32GetModuleFileNameExA
TerminateProcess
VirtualProtectEx
WriteProcessMemory
VirtualQueryEx
FormatMessageW
WideCharToMultiByte
LocalFree
TlsAlloc
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateEventW
WaitForMultipleObjects
QueueUserAPC
SetEvent
SleepEx
PostQueuedCompletionStatus
CreateIoCompletionPort
SetWaitableTimer
GetQueuedCompletionStatus
SetLastError
VerSetConditionMask
VerifyVersionInfoW
CreateWaitableTimerW
GetSystemTimeAsFileTime
GetVolumeInformationW
TlsGetValue
TlsSetValue
TlsFree
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
MoveFileW
WriteFile
CreateFileW
DeleteFileW
FindFirstFileW
LoadLibraryA
SetThreadExecutionState
MultiByteToWideChar
FreeLibrary
QueryPerformanceCounter
QueryPerformanceFrequency
InitializeCriticalSection
GetStdHandle
GetFileType
GetCurrentThreadId
LoadLibraryW
GetCurrentProcessId
ReadProcessMemory
GlobalMemoryStatus
FlushConsoleInputBuffer
GetSystemTime
SystemTimeToFileTime
CloseHandle
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
RtlUnwind
GetNativeSystemInfo
OpenProcess
GetModuleHandleA
GetProcAddress
WriteConsoleW
SetEndOfFile
HeapSize
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
SetConsoleMode
ReadConsoleInputA
SetStdHandle
HeapReAlloc
GetTimeZoneInformation
ReadConsoleW
SetFilePointerEx
FlushFileBuffers
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
HeapAlloc
HeapFree
GetACP
ExitProcess
SetConsoleCtrlHandler
GetModuleHandleExW
ExitThread
RaiseException
RtlPcToFileHeader
RtlUnwindEx
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
VirtualProtect
GetVersionExW
LoadLibraryExW
GetModuleFileNameW
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
TerminateThread
SignalObjectAndWait
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateThread
Sleep
FileTimeToSystemTime
GetCurrentDirectoryW
GetFullPathNameW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
SwitchToThread
DecodePointer
EncodePointer
TryEnterCriticalSection
FindFirstFileA
GetTickCount
user32
SendMessageW
GetWindowLongW
SetWindowLongW
GetDC
GetClientRect
ReleaseDC
OpenClipboard
GetClipboardData
CloseClipboard
EmptyClipboard
SetClipboardData
CallNextHookEx
SetWindowsHookExW
GetMessageW
TranslateMessage
DispatchMessageW
GetCursorPos
UnhookWindowsHookEx
MapVirtualKeyW
GetKeyNameTextW
TrackMouseEvent
PeekMessageW
GetMessageTime
DefWindowProcW
UnregisterClassW
RegisterClassExW
CreateWindowExW
DestroyWindow
SetLayeredWindowAttributes
ScreenToClient
GetKeyState
GetWindowTextA
GetForegroundWindow
ShowWindow
WindowFromPoint
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetRawInputDeviceList
GetRawInputDeviceInfoA
EnumDisplayMonitors
EnumDisplayDevicesW
EnumDisplaySettingsExW
ChangeDisplaySettingsExW
SystemParametersInfoW
ToUnicode
UnregisterDeviceNotification
RegisterDeviceNotificationW
RegisterRawInputDevices
GetRawInputData
GetMonitorInfoW
MonitorFromWindow
CopyIcon
LoadImageW
DestroyIcon
LoadCursorW
PtInRect
SetRect
ClipCursor
EnumDisplaySettingsW
ClientToScreen
SetCursor
SetCursorPos
AdjustWindowRectEx
RemovePropW
GetPropW
SetPropW
RedrawWindow
SetForegroundWindow
ReleaseCapture
SetCapture
GetAsyncKeyState
GetActiveWindow
SetFocus
IsZoomed
BringWindowToTop
IsIconic
IsWindowVisible
SetWindowPos
gdi32
DescribePixelFormat
CreateRectRgn
CreateDCW
DeleteDC
GetDeviceCaps
DeleteObject
GetDIBits
GetObjectW
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
SetPixelFormat
ChoosePixelFormat
SetDeviceGammaRamp
SwapBuffers
advapi32
RegCloseKey
CryptEnumProvidersA
CryptAcquireContextA
CryptGenRandom
RegQueryValueExA
RegQueryInfoKeyW
RegEnumValueW
RegDeleteValueW
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExW
RegOpenKeyExW
OpenProcessToken
ReportEventW
RegisterEventSourceW
DeregisterEventSource
GetTokenInformation
CryptReleaseContext
shell32
ShellExecuteA
DragQueryPoint
DragFinish
DragAcceptFiles
DragQueryFileW
ntdll
NtUnmapViewOfSection
NtReadVirtualMemory
NtWriteVirtualMemory
NtResumeThread
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
NtWaitForSingleObject
NtGetContextThread
NtClose
NtTerminateProcess
NtSetContextThread
imm32
ImmSetCompositionWindow
ImmGetContext
ws2_32
shutdown
getsockname
getpeername
getsockopt
connect
bind
accept
__WSAFDIsSet
htons
htonl
ntohl
freeaddrinfo
getaddrinfo
WSAGetLastError
WSAAddressToStringW
setsockopt
WSASocketW
WSASend
WSARecv
listen
select
ioctlsocket
closesocket
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
ntohs
send
recv
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 744KB - Virtual size: 743KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 305KB - Virtual size: 431KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.9MB - Virtual size: 5.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.v-lizer Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE