c:\IBryte\Source\OfferInstaller_Resized\Bootstrapper\Release\Bootstrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
028c0d25f3395987d9464917cabf8590_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
028c0d25f3395987d9464917cabf8590_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
028c0d25f3395987d9464917cabf8590_JaffaCakes118
-
Size
566KB
-
MD5
028c0d25f3395987d9464917cabf8590
-
SHA1
0301b3d45643647c2cb14caf2d2962e4129369f5
-
SHA256
2f25c9c843c6b9c22a1f479665b548cfed9d0775e5510ee7b0542d5b050dda56
-
SHA512
450d59b9cad8cf9ffc8f76ba6e8ee51ed58f2897ef932ae48aa90f5a02c56c805c187320f9470937d27ba5406bff014259a1cca6a4719a406954707166b6a7a5
-
SSDEEP
12288:jLo3+XZYAN7hKGom7JYInrgcR5KWd2JJvbGHaoLhd+hRBMez2pY:jLC+XZYAN7hKGoIJYInrgc+Wd2XbGHal
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 028c0d25f3395987d9464917cabf8590_JaffaCakes118
Files
-
028c0d25f3395987d9464917cabf8590_JaffaCakes118.exe windows:5 windows x86 arch:x86
2e63c3f0d94eb9a28fcf80ef22c805df
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetOEMCP
SetErrorMode
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetTickCount
RtlUnwind
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapFree
HeapAlloc
GetDriveTypeA
GetCommandLineA
GetStartupInfoA
ExitProcess
ExitThread
CreateThread
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
HeapSize
GetACP
IsValidCodePage
LCMapStringA
GetCPInfo
HeapCreate
VirtualFree
SetHandleCount
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
GetFileInformationByHandle
PeekNamedPipe
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetProcessHeap
GetLocaleInfoW
CompareStringW
SetEnvironmentVariableA
GetModuleHandleW
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
GetCurrentDirectoryA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetModuleFileNameW
GlobalUnlock
LocalFree
MulDiv
FreeResource
GlobalFree
WritePrivateProfileStringA
GetCurrentProcessId
SetLastError
GlobalAddAtomA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
lstrcpynA
CreateProcessA
EnterCriticalSection
LeaveCriticalSection
FormatMessageA
InitializeCriticalSection
GetModuleHandleA
WriteFile
DeleteFileA
GetTempFileNameA
CreateFileA
CreateDirectoryA
lstrlenA
WaitForSingleObject
GetExitCodeProcess
LoadLibraryA
GetProcAddress
FreeLibrary
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetModuleFileNameA
RemoveDirectoryA
Sleep
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
CreateFileW
SizeofResource
MultiByteToWideChar
CloseHandle
CreateMutexA
LCMapStringW
GetLastError
user32
GetMenuItemInfoA
RegisterClipboardFormatA
PostThreadMessageA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
DefWindowProcA
CallWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
UnhookWindowsHookEx
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowContextHelpId
MapDialogRect
GetWindowTextA
SetWindowPos
SetFocus
MoveWindow
SetWindowLongA
GetDlgCtrlID
IsWindow
SetWindowTextA
IsDialogMessageA
UnpackDDElParam
SendDlgItemMessageA
UnregisterClassA
GetDlgItem
GetWindow
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
ShowOwnedPopups
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostMessageA
PostQuitMessage
CloseWindow
KillTimer
SetTimer
LoadStringA
LoadImageA
GetDC
ReleaseDC
GetSystemMetrics
CreateWindowExA
UpdateWindow
ReuseDDElParam
LoadMenuA
DestroyMenu
LoadCursorA
SetCursor
ShowWindow
SwitchToThisWindow
LoadIconA
EnableWindow
SetForegroundWindow
InvalidateRect
GetClientRect
GetWindowRect
BringWindowToTop
IsIconic
SendMessageA
DrawIcon
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
PtInRect
CopyRect
GetSysColorBrush
SetCapture
ReleaseCapture
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
TranslateAcceleratorA
InflateRect
CharUpperA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
DeferWindowPos
gdi32
SetTextColor
SetMapMode
GetClipBox
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
GetStockObject
CreateSolidBrush
CreateFontIndirectA
CreateRectRgnIndirect
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
GetTextExtentPoint32A
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
SetStretchBltMode
StretchBlt
CreateCompatibleBitmap
GetDeviceCaps
GetCurrentObject
GetObjectA
CreateCompatibleDC
SelectObject
SetWindowExtEx
DeleteObject
BitBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetFolderPathA
Shell_NotifyIconA
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
SHDeleteKeyA
oledlg
ord8
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleFlushClipboard
CoRegisterMessageFilter
CoGetClassObject
oleaut32
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
SysFreeString
urlmon
URLDownloadToFileA
Sections
.text Size: 431KB - Virtual size: 431KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ