C:\BuildAgent\work\b0d71a1a28f6c898\Release\Win32\Installer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a3bc4e8a39f9d84cd02969ec4800b9fb_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a3bc4e8a39f9d84cd02969ec4800b9fb_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a3bc4e8a39f9d84cd02969ec4800b9fb_JaffaCakes118
-
Size
1.6MB
-
MD5
a3bc4e8a39f9d84cd02969ec4800b9fb
-
SHA1
775ffe0247a393e5bcd9ce004da0b89ecf985547
-
SHA256
59beb85fd3cf7e4672ee28ffeb29050562c988b424b0ac28295fed870939ed94
-
SHA512
1d8a5b594d5502d591f5ee77467316cd3c2fe33e75e69e49ebb1ff3ab3ea985c824f0998976b919717e0495f278b1f524659666606335f75aa44356fb6017d99
-
SSDEEP
12288:dnqmn0EvOtDXhNQvtM4ulCR8Y8Vfnc0B55sl4cQVhOQcQzjpLR9++o4wpD/+Bc:dnqmnlqDx4ulPfc0uloXcmLz++oV/yc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3bc4e8a39f9d84cd02969ec4800b9fb_JaffaCakes118
Files
-
a3bc4e8a39f9d84cd02969ec4800b9fb_JaffaCakes118.exe windows:6 windows x86 arch:x86
893418eebc2cfa77ba596178b11b387e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdiplus
GdipDrawImageI
GdipCreateBitmapFromStream
GdipDrawImageRectI
GdiplusShutdown
GdiplusStartup
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromFile
GdipGetImageWidth
GdipDisposeImage
GdipFillPath
GdipFillRectangle
GdipDrawLine
GdipSetPathGradientCenterPointI
GdipSetPathGradientSurroundColorsWithCount
GdipGetPathGradientPointCount
GdipSetPathGradientCenterColor
GdipCreatePathGradientFromPath
GdipAddPathEllipse
GdipDeleteFont
GdipCreateFontFromDC
GdipMeasureString
GdipDrawString
GdipFillRectangleI
GdipDrawPath
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipAddPathArcI
GdipAddPathLineI
GdipClosePathFigure
GdipDeletePath
GdipCreatePath
GdipDeletePen
GdipCreatePen1
GdipCreateLineBrushFromRectI
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipAlloc
GdipFree
GdipSetPenColor
GdipSetLineColors
GdipSetSolidFillColor
GdipGetImageHeight
GdipCloneImage
winhttp
WinHttpSetOption
WinHttpGetIEProxyConfigForCurrentUser
WinHttpCloseHandle
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpConnect
WinHttpOpen
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpWriteData
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpGetProxyForUrl
kernel32
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
GetProcAddress
GetModuleHandleW
GetModuleHandleExW
GetLastError
FreeResource
CopyFileW
GetTickCount
DeleteFileW
GetFileAttributesExW
CloseHandle
CreateFileW
ReadFile
FlushFileBuffers
GetFileSize
GetTempPathW
GetTempFileNameW
MoveFileW
FindFirstFileW
FindNextFileW
FindClose
CreateThread
Sleep
GetModuleFileNameW
CreateDirectoryW
GlobalLock
WriteFile
GlobalUnlock
SetEvent
WaitForSingleObject
TerminateThread
InitializeCriticalSectionEx
DeleteCriticalSection
CreateEventW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
GetVersionExW
GetCurrentProcess
ExpandEnvironmentStringsW
GetFileAttributesW
GetVersion
LCMapStringW
SetFilePointer
OpenProcess
TerminateProcess
LoadLibraryW
MultiByteToWideChar
WaitForMultipleObjects
GlobalFree
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetSystemTime
GetCurrentThreadId
GetExitCodeProcess
GetFileSizeEx
GlobalAlloc
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
HeapSize
GetNativeSystemInfo
GetUserDefaultUILanguage
GetLocalTime
RaiseException
DecodePointer
GetFirmwareEnvironmentVariableW
DuplicateHandle
GetFileInformationByHandle
FileTimeToSystemTime
SystemTimeToFileTime
GetFileType
FileTimeToDosDateTime
LocalFree
VirtualProtect
VirtualQuery
FreeLibrary
LoadLibraryExA
HeapDestroy
FindResourceExW
FindResourceW
LocalAlloc
IsWow64Process
GetSystemInfo
WriteConsoleW
GetLocaleInfoW
GetCPInfo
SetCriticalSectionSpinCount
VerSetConditionMask
VerifyVersionInfoW
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
RtlUnwind
LoadLibraryExW
ExitProcess
GetStdHandle
GetACP
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetSystemDirectoryW
SetStdHandle
GetConsoleCP
GetConsoleMode
LoadResource
LockResource
SizeofResource
GetVolumePathNameW
GetVolumeNameForVolumeMountPointW
DeviceIoControl
IsDebuggerPresent
OutputDebugStringW
GetStringTypeW
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
MoveFileExW
CompareStringW
SetFilePointerEx
SetLastError
user32
CreateDialogParamW
GetWindowLongW
GetWindowDC
SetDlgItemTextW
SetTimer
BeginPaint
GetPropW
SetPropW
PostMessageW
SendDlgItemMessageW
DrawFocusRect
GetDialogBaseUnits
GetSysColor
ExitWindowsEx
EndPaint
EndDialog
KillTimer
SetWindowTextW
SetFocus
LoadImageW
GetSystemMetrics
GetCursorPos
GetDesktopWindow
DestroyWindow
RegisterWindowMessageW
EnableWindow
GetWindowThreadProcessId
GetForegroundWindow
AttachThreadInput
BringWindowToTop
InvalidateRect
TrackMouseEvent
GetClientRect
IsWindowEnabled
GetParent
ScreenToClient
IsWindow
DefWindowProcW
ReleaseDC
GetKeyState
DialogBoxParamW
GetWindow
SetCursor
LoadCursorW
GetDC
MessageBoxW
SetWindowLongW
CallWindowProcW
HideCaret
SendMessageW
ShowWindow
SetWindowPos
GetDlgItem
GetWindowRect
gdi32
GetStockObject
GetObjectW
CreatePatternBrush
EnumFontFamiliesExW
DeleteObject
ExtTextOutW
GetTextMetricsW
SetBkMode
SetTextColor
DeleteDC
BitBlt
SelectObject
CreateCompatibleBitmap
GetDeviceCaps
CreateCompatibleDC
CreateFontIndirectW
SetBrushOrgEx
SetBkColor
StretchBlt
advapi32
CryptGetKeyParam
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptVerifySignatureW
CryptDestroyHash
CryptDestroyKey
CryptReleaseContext
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
RegSetValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegEnumKeyExW
RegLoadKeyW
RegDeleteValueW
ControlService
QueryServiceStatus
RegDeleteKeyW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CryptGetHashParam
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameW
AllocateAndInitializeSid
LookupAccountSidW
FreeSid
SystemFunction036
CryptEncrypt
CryptExportKey
CryptGenKey
SetFileSecurityW
SetEntriesInAclW
RegDeleteKeyExW
RegDeleteTreeW
RegOpenKeyW
CryptImportKey
shell32
Shell_NotifyIconW
ShellExecuteExW
ShellExecuteW
SHGetFolderPathW
ole32
CoSetProxyBlanket
CoTaskMemFree
CoInitialize
CoCreateInstance
CoInitializeSecurity
CoUninitialize
CoInitializeEx
GetHGlobalFromStream
CreateStreamOnHGlobal
CoCreateGuid
StringFromCLSID
oleaut32
SysAllocStringByteLen
SysFreeString
SysAllocString
VariantInit
SysStringByteLen
OleCreatePictureIndirect
SysAllocStringLen
SysStringLen
VariantChangeType
VariantClear
shlwapi
StrToIntExW
PathFileExistsW
PathFindFileNameW
PathRemoveExtensionW
PathFindExtensionW
PathAddBackslashW
PathRemoveFileSpecW
PathAppendW
PathStripPathW
SHCopyKeyW
psapi
GetModuleFileNameExW
EnumProcesses
uxtheme
SetWindowTheme
crypt32
CryptStringToBinaryW
CryptDecodeObjectEx
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
Sections
.text Size: 524KB - Virtual size: 523KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 912KB - Virtual size: 911KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ