d:\module\edition2\release\wyx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
05abb7fe10c9ae8cda6ed6e6ba420f16_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
05abb7fe10c9ae8cda6ed6e6ba420f16_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
05abb7fe10c9ae8cda6ed6e6ba420f16_JaffaCakes118
-
Size
616KB
-
MD5
05abb7fe10c9ae8cda6ed6e6ba420f16
-
SHA1
6b650b92d75d6e12bfe8117d4b4bc4de5e66e99c
-
SHA256
cefe1640bfdd960644d2915b94c74b522040b64b8ac4014c70e34fc03505ace6
-
SHA512
bcdb57cedb1212ad15a4adac515708aaf0603e33e72618aa67e366682e63c9d1892e86250930afee2a5e5f19f60d737afd8967ccd5bd65bd2f2a9ce7e01a5a07
-
SSDEEP
12288:f58Yk79jbIMzzE71ml1M4xAPMTQQQQ03Bru21WtKfGeCOXu0r:f58JNIMzzE716SA2M83Bt1qtetuW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05abb7fe10c9ae8cda6ed6e6ba420f16_JaffaCakes118
Files
-
05abb7fe10c9ae8cda6ed6e6ba420f16_JaffaCakes118.exe windows:4 windows x86 arch:x86
f29e45e70f930af2f4544fd9a39054e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetFileAttributesW
GetFileTime
SetErrorMode
GetTickCount
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
ExitProcess
HeapReAlloc
RtlUnwind
RaiseException
SetStdHandle
GetFileType
ExitThread
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
TlsAlloc
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
GetCurrentDirectoryA
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GlobalHandle
GlobalReAlloc
TlsGetValue
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrlenA
CreateFileW
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateEventW
SetEvent
SetThreadPriority
GetThreadLocale
InterlockedIncrement
FindFirstFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindClose
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
FreeLibrary
InterlockedDecrement
GetModuleHandleA
GetProcAddress
GetLastError
SetLastError
GlobalFree
FormatMessageW
LocalFree
MulDiv
WideCharToMultiByte
GetPrivateProfileSectionW
OpenProcess
GetCurrentProcessId
GetTempFileNameW
GetTempPathW
CreateProcessW
Sleep
ResumeThread
SuspendThread
GetModuleHandleW
lstrlenW
WaitForSingleObject
CloseHandle
WritePrivateProfileStringW
CopyFileW
DeleteFileW
CreateDirectoryW
GetSystemDirectoryW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetVersionExW
GlobalMemoryStatus
MultiByteToWideChar
GetModuleFileNameW
CreateThread
FreeResource
GlobalUnlock
GlobalLock
GlobalAlloc
FindResourceW
LoadResource
LockResource
GetCommandLineW
SizeofResource
user32
SetCapture
ReleaseCapture
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatW
PostThreadMessageW
CharUpperW
DestroyMenu
GetMessageW
TranslateMessage
ValidateRect
CharNextW
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
InvalidateRgn
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetKeyState
IsWindowVisible
GetMenu
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
UnhookWindowsHookEx
IntersectRect
CopyRect
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetWindowLongW
GetDlgItem
SetRect
IsRectEmpty
CopyAcceleratorTableW
UnregisterClassW
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
GetTopWindow
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
UpdateWindow
SetCursor
PostMessageW
IsWindow
GetCursorPos
GetSubMenu
LoadMenuW
SetForegroundWindow
SetWindowRgn
OffsetRect
GetWindowRect
SendMessageW
GetSystemMetrics
SystemParametersInfoW
LoadIconW
LoadCursorW
EnableWindow
InvalidateRect
KillTimer
GetParent
SetTimer
PtInRect
GetClientRect
wsprintfW
UnregisterClassA
gdi32
ExtSelectClipRgn
DeleteDC
CreateBitmap
GetStockObject
PtVisible
ScaleWindowExtEx
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetWindowExtEx
GetViewportExtEx
GetObjectW
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
CreateCompatibleDC
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
CreateRoundRectRgn
BitBlt
CreateDIBSection
RectVisible
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteW
Shell_NotifyIconW
shlwapi
PathIsUNCW
PathFindExtensionW
UrlUnescapeW
PathStripToRootW
PathFindFileNameW
oledlg
OleUIBusyW
ole32
OleFlushClipboard
CreateStreamOnHGlobal
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
OleIsCurrentClipboard
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
oleaut32
OleCreateFontIndirect
VariantChangeType
SafeArrayDestroy
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocStringLen
SysStringLen
SysAllocString
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
VariantClear
VariantCopy
VariantInit
gdiplus
GdipCloneImage
GdipDisposeImage
GdipFree
GdipAlloc
GdipDrawImageRectRectI
GdipGetImageWidth
GdipGetImageHeight
GdipLoadImageFromStream
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipMeasureString
GdipDrawImageRect
GdiplusStartup
GdiplusShutdown
GdipCreateFromHDC
GdipDrawImage
GdipDrawString
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDrawImageRectI
GdipCreateStringFormat
GdipDeleteGraphics
wininet
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetQueryOptionW
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetGetLastResponseInfoW
InternetCloseHandle
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
InternetQueryDataAvailable
InternetOpenW
InternetGetConnectedState
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
winmm
timeGetTime
ws2_32
gethostbyname
WSACleanup
WSAStartup
Sections
.text Size: 300KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 228KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ