D:\srcode\wL independent installer\yoki_winstaller\each_code_for_five\solution_mmker\Release\mfc_installer_independent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
91a1d98bbb5ed70cbc9baa88228f1533_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
91a1d98bbb5ed70cbc9baa88228f1533_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
91a1d98bbb5ed70cbc9baa88228f1533_JaffaCakes118
-
Size
7.8MB
-
MD5
91a1d98bbb5ed70cbc9baa88228f1533
-
SHA1
b5978256cd243706a8f66aa08cd02f0cddce7152
-
SHA256
2ee77c35fb586e4ae19bcfb618433a013df8a6c82bc5b371929392a13a134c62
-
SHA512
8fa9992371ae3ad289f67189b2fe5f45fe888364f37f26c61c07fda47c0e58fbf4324b27fae594ef0329a8b82078b8f382251d41728a7a4df0c40009a0d70793
-
SSDEEP
196608:2nEe2866gBGFudPrmmh/O+NlMMqy366L+bHuS/TK:v866gQFqrdjNeMPLEuQTK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 91a1d98bbb5ed70cbc9baa88228f1533_JaffaCakes118
Files
-
91a1d98bbb5ed70cbc9baa88228f1533_JaffaCakes118.exe windows:5 windows x86 arch:x86
f394583cb07c0597ffafc3a940ffc3c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
CreateThread
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
RaiseException
ExitProcess
HeapSize
VirtualProtect
VirtualAlloc
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
GetTickCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetProcessHeap
CreateFileA
SetEnvironmentVariableA
GetFileTime
GetFileSizeEx
GetFileAttributesW
FileTimeToLocalFileTime
SetErrorMode
FileTimeToSystemTime
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetCurrentProcessId
GetFullPathNameW
GetVolumeInformationW
FindClose
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
ResumeThread
GetModuleHandleA
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
GetVersionExA
GlobalAlloc
FormatMessageW
LocalFree
MulDiv
GetModuleFileNameW
SetLastError
GlobalLock
GlobalUnlock
GlobalFree
GetLastError
lstrlenA
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
GetSystemDirectoryW
GetFileSize
SetEvent
CreateEventW
Sleep
RemoveDirectoryW
FindNextFileW
FindFirstFileW
DeleteFileW
GetSystemInfo
GetVersionExW
WaitForSingleObject
CreateProcessW
FreeLibrary
lstrlenW
LoadLibraryW
FreeResource
CloseHandle
WriteFile
CreateFileW
CreateDirectoryW
lstrcatW
lstrcmpW
FindResourceW
LoadResource
LockResource
SizeofResource
GetCurrentProcess
GetModuleHandleW
VirtualFree
GetProcAddress
user32
PostThreadMessageW
CopyAcceleratorTableW
SetRect
IsRectEmpty
CharNextW
GetSysColorBrush
UnregisterClassW
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
GetWindowThreadProcessId
CharUpperW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
CheckMenuItem
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
IsWindowVisible
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
DefWindowProcW
CallWindowProcW
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextW
GetFocus
SetWindowPos
SetFocus
MoveWindow
GetDlgCtrlID
IsDialogMessageW
LoadIconW
GetSystemMenu
AppendMenuW
SendMessageW
GetWindowLongW
SendDlgItemMessageW
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSysColor
RegisterClipboardFormatW
DestroyMenu
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
LoadStringW
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
IsWindow
SetForegroundWindow
PostMessageW
EnableWindow
CharLowerW
LoadBitmapW
GetDlgItem
SetWindowTextW
GetParent
RegisterWindowMessageW
ShowWindow
SetTimer
KillTimer
EnableMenuItem
DeleteMenu
PtInRect
SetCapture
InvalidateRect
ReleaseCapture
SetWindowLongW
LoadCursorW
SetCursor
MessageBoxW
GetDC
EndDialog
GetNextDlgTabItem
IsWindowEnabled
DestroyWindow
CreateDialogIndirectParamW
SetActiveWindow
GetActiveWindow
GetDesktopWindow
UnhookWindowsHookEx
CopyRect
gdi32
CreateBitmap
CreateRectRgnIndirect
GetMapMode
DeleteDC
GetBkColor
GetTextColor
GetRgnBox
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
GetObjectW
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
ExtTextOutW
CreateSolidBrush
CreateFontIndirectW
GetStockObject
RectVisible
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegOpenKeyW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteW
SHGetFolderPathW
comctl32
InitCommonControlsEx
shlwapi
StrCmpW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
PathIsDirectoryW
oledlg
OleUIBusyW
ole32
CoTaskMemAlloc
CoTaskMemFree
OleRun
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysFreeString
VariantInit
VariantClear
SysStringLen
VariantChangeType
SysAllocStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
GetErrorInfo
SysAllocString
urlmon
CreateURLMoniker
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
wininet
InternetGetConnectedState
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
InternetCloseHandle
InternetOpenW
msi
ord16
ord141
ord137
ord88
Sections
.text Size: 295KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45.5MB - Virtual size: 45.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ