c:\WINDOWS\Ying-UnInstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
038b4c2c127b2115b7177c06fce212c0_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
038b4c2c127b2115b7177c06fce212c0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
038b4c2c127b2115b7177c06fce212c0_JaffaCakes118
-
Size
443KB
-
MD5
038b4c2c127b2115b7177c06fce212c0
-
SHA1
cddd16365544a3af3c8fd47365f5390c7b1893cd
-
SHA256
d9af6e4c716c6184d58049fa90aaf7821dadb0a5fccedb0f9a2d4a193bb5e097
-
SHA512
5d48c632384637d3ccd7204a2c7d65428ea26f7e728fd72928ee7be1552309cfe0022d7f348aef5fdc70f82d4d27be4eb4f16e5a77e275d291d99b9b7f6350f4
-
SSDEEP
6144:WPm9X6CpdVoqv+7LZ04EgPxy7MfXSL6GHmuOFeAtdZ2J7MqDdzsvxeddjaKccI:/Xhpd23EcxyjGuOFeA/o7MadXdGl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 038b4c2c127b2115b7177c06fce212c0_JaffaCakes118
Files
-
038b4c2c127b2115b7177c06fce212c0_JaffaCakes118.exe windows:5 windows x86 arch:x86
aa9c68093151e03faccd23796bb3f525
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesA
GetFileSizeEx
GetTickCount
RtlUnwind
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
Sleep
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
HeapCreate
SetErrorMode
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GetModuleHandleW
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
GetModuleFileNameW
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
GetModuleFileNameA
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GlobalLock
GlobalUnlock
GlobalFree
lstrlenA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
WideCharToMultiByte
CompareStringA
LoadLibraryA
GetLastError
SetLastError
MultiByteToWideChar
FreeLibrary
lstrcmpW
GetModuleHandleA
GetProcAddress
FindResourceA
LoadResource
LockResource
SizeofResource
FindFirstFileA
FindClose
CreateThread
SetThreadPriority
WinExec
RemoveDirectoryA
GetComputerNameA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
SetCurrentDirectoryA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
GetVersion
GetVersionExA
SetFileAttributesA
DeleteFileA
GetSystemDefaultLCID
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CreateFileA
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
VirtualFree
CloseHandle
user32
PostThreadMessageA
CopyAcceleratorTableA
CharNextA
CharUpperA
ReleaseCapture
SetCapture
DestroyMenu
LoadCursorA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterClipboardFormatA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
EnableWindow
SendMessageA
SetTimer
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
UnregisterClassA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
IsRectEmpty
KillTimer
SetRect
GetClientRect
InvalidateRect
MessageBoxA
DrawIcon
IsIconic
GetDC
LoadIconA
GetSystemMetrics
PostQuitMessage
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
GetParent
GetFocus
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetWindow
GetWindowRect
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongA
GetWindowLongA
GetMenu
PtInRect
CallWindowProcA
DefWindowProcA
GetDlgCtrlID
CopyRect
gdi32
DeleteDC
GetStockObject
GetDeviceCaps
CreatePen
CreateSolidBrush
ExtSelectClipRgn
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
PtVisible
CreateFontIndirectA
GetWindowExtEx
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
Rectangle
SetPixel
BitBlt
GetViewportExtEx
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
RectVisible
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
GetUserNameA
RegCreateKeyA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetSpecialFolderPathA
comctl32
_TrackMouseEvent
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleFlushClipboard
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoRegisterMessageFilter
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
Sections
.text Size: 331KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ