C:\昇泰安\龙宇\工作室\yinyue.fm\封装文件\静默安装包\正常包\Release\SetupApp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae4f3d4e884d2c34228c2afa8f3394d4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ae4f3d4e884d2c34228c2afa8f3394d4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
ae4f3d4e884d2c34228c2afa8f3394d4_JaffaCakes118
-
Size
3.7MB
-
MD5
ae4f3d4e884d2c34228c2afa8f3394d4
-
SHA1
07bcb2f959500b31726066cd3ef669cb4e607054
-
SHA256
58e6da548a8abde3d5e2fb550f8f2f8d2998f98ba4e87871fda1629c44ec90a1
-
SHA512
28e16342a0d628ec3e0320699d7f906fbaeec8c2004f2b3ef3644046287355125840f2e5c75263a9accaa0eabe12fb9295fa45e9f4551ce59d5840c907cbd1b6
-
SSDEEP
98304:obYse0bLs2VNrt5/nLQOBualSyhFKNGpM0WT+4JJN:obYrYLfNrbfBdlSyhFVMplN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae4f3d4e884d2c34228c2afa8f3394d4_JaffaCakes118
Files
-
ae4f3d4e884d2c34228c2afa8f3394d4_JaffaCakes118.exe windows:5 windows x86 arch:x86
712b6f815005ba4717cdad7a2c69f468
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msimg32
GradientFill
kernel32
CreateMutexA
FindResourceA
FreeResource
LoadResource
SizeofResource
GetFileAttributesA
LockResource
OutputDebugStringA
DosDateTimeToFileTime
CreateFileA
SetFilePointer
SystemTimeToFileTime
SetFileTime
WriteFile
ReadFile
GetFileType
GetCurrentDirectoryW
GetFullPathNameA
GetDriveTypeW
CreateFileW
FlushFileBuffers
GetLastError
WriteConsoleW
SetStdHandle
GetStringTypeW
GetConsoleMode
GetConsoleCP
HeapSize
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsProcessorFeaturePresent
HeapCreate
LCMapStringW
IsValidCodePage
GetOEMCP
GetCPInfo
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetACP
WideCharToMultiByte
MultiByteToWideChar
DeleteFileA
CloseHandle
WinExec
GetModuleFileNameA
GetModuleHandleA
WritePrivateProfileStringA
GetLocalTime
GetPrivateProfileStringA
SetFileAttributesA
CreateDirectoryA
TerminateProcess
Sleep
OpenProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetStdHandle
GetCurrentThreadId
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapReAlloc
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
user32
MoveWindow
GetDlgCtrlID
FindWindowA
UpdateWindow
LoadImageA
GetSystemMetrics
DispatchMessageA
WindowFromDC
ShowWindow
SetLayeredWindowAttributes
SetWindowPos
GetDlgItem
InvalidateRect
TranslateMessage
BeginPaint
SendMessageA
GetClientRect
LoadBitmapA
DrawTextA
KillTimer
PostQuitMessage
CreateDialogParamA
GetWindowRect
SetTimer
GetMessageA
DestroyWindow
PostMessageA
wvsprintfA
EndPaint
gdi32
SetTextColor
DeleteDC
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
GetStockObject
BitBlt
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
shell32
SHCreateDirectoryExA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoCreateInstance
CoTaskMemFree
CoInitialize
gdiplus
GdiplusStartup
shlwapi
PathStripPathA
psapi
EnumProcesses
GetModuleFileNameExA
EnumProcessModules
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ