p:\Projects\Bravostudio\GameVance.200\PopupClient\HookSrv\Release\HookSrv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0fde4bd024ef30b172a6aff38219a98d_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0fde4bd024ef30b172a6aff38219a98d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0fde4bd024ef30b172a6aff38219a98d_JaffaCakes118
-
Size
77KB
-
MD5
0fde4bd024ef30b172a6aff38219a98d
-
SHA1
d99df61934ccdf5ec5b44597ac5aa97cddcfd5f3
-
SHA256
cf8476e17e255cf8a5b93943a3c9eb27159b41c061873d3dbbcb4a5875aae883
-
SHA512
1d2b2ae49744248efa380d44bc570ea64a83bebfc10c6d6f2fb90c5af32d7fcdb65c30b9698223f3e91e374b934f423d959aa8e7f430af9d5b23cc9362449dc1
-
SSDEEP
1536:KrA5jII1vtjSI1ogLJO7UtHMl5TTx2ORFK7ULAD:qA5kI1R20sl72ORFGULY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fde4bd024ef30b172a6aff38219a98d_JaffaCakes118
Files
-
0fde4bd024ef30b172a6aff38219a98d_JaffaCakes118.exe windows:4 windows x86 arch:x86
09ed3a7efb8ac7b4daed18dc65aaf2bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
StrNCatA
StrStrIA
StrStrA
wnsprintfA
gvcfglib
GetUuid
?IsPopupEngineDisabled@@YGHXZ
?GetExcludedUrlsSeq@@YGKPAD@Z
?SetPopupsStatusDisabled@@YGHKPAD@Z
?SetCheckPopServer@@YGHPAD0@Z
?SetDefaultCfgServer@@YGHPAD0@Z
SetAdLocation
?SetGeoIPCountryCode@@YGHPAD0@Z
?SetClientId@@YGHPAD0@Z
?xml_parse_config@@YGHPADPAPAU_tagCONFIG_STRUCT@@PAHPAUst_string_table@@@Z
?SetExcludedUrlsSeq@@YGHKPAD@Z
?string_table_add@@YGHPAUst_string_table@@PAD@Z
?GetGeoIPCountryCode@@YGHPADH0@Z
GetAdLocation
?GetDefaultCfgServer@@YGHPADK0@Z
?string_table_alloc@@YGHPAPAUst_string_table@@@Z
?GetPopupCountNT@@YGKPAD@Z
?GetPopupCountT@@YGKPAD@Z
?GetLastPopupTimeNT@@YG?AU_FILETIME@@PAD@Z
?GetLastPopupTimeT@@YG?AU_FILETIME@@PAD@Z
?GetClientId@@YGHPADK0@Z
?IsHeaderFirstRun@@YGHXZ
?GetCheckPopServer@@YGHPADK0@Z
?GetWS2SendFrame@@YGHPADK@Z
?SetCrc64@@YGHPAD0@Z
?string_table_delete_all@@YGHPAUst_string_table@@@Z
?GetCrc64@@YGHPADK0@Z
?GetClientInstallDate@@YG?AU_FILETIME@@XZ
?GetCfgFilePath@@YGHPADH@Z
?SetClientInstallDate@@YGXU_FILETIME@@@Z
?SetLastPopupTimeNT@@YGHU_FILETIME@@PAD@Z
?SetPopupCountNT@@YGHKPAD@Z
?SetLastPopupTimeT@@YGHU_FILETIME@@PAD@Z
?SetPopupCountT@@YGHKPAD@Z
gvpop
?LoadFiredPopups_NT@@YGHPAPAU_tagQoolPopup@@PAD@Z
?LoadFiredPopups_T@@YGHPAPAU_tagQoolPopup@@PAD@Z
?ParsePacketContent@@YGHPAU_tagHttpData@@PAUHWND__@@PAUst_string_table@@2PAPAU_tagQoolPopup@@3H@Z
?IsPopupInProgress@@YGHXZ
?CanCheckPopup@@YGHPAU_TSharedStruct@@PAU_tagPopupInfo@@@Z
?RemoveOldPopups@@YGHPAPAU_tagQoolPopup@@@Z
?SaveQoolPopups_NT@@YGHPAU_tagQoolPopup@@PAD@Z
?AddFiredPid@@YGHPAPAU_tagQoolPopup@@HH@Z
?ShowPopupInDefaultBrowser2@@YGHKPAU_tagPopupData@@@Z
?SaveQoolPopups_T@@YGHPAU_tagQoolPopup@@PAD@Z
?ShowPopupInDefaultBrowser@@YGHKPAU_tagPopupData@@@Z
?ParsePopupData@@YGHPADPAU_tagPopupData@@@Z
?SetPopupInProgress@@YGHH@Z
gvutil
?GetWindowsProductId@@YGHPADK@Z
?GetIEVersion@@YGXPADK@Z
?GetOSVersionString@@YGHPADK@Z
?GetHardwareHashCrcHex@@YGHPADH@Z
?EnumTasks@@YGHP6GHPADPAX@Z1@Z
?task_can_execute@@YGHPADPAX@Z
?GetUniqueClientId@@YGHPADK@Z
?DeleteRecoveryModule@@YGXXZ
?DeleteOldTasks@@YGHPAD@Z
?CreateTask@@YGHPAU_tagTASK_STRUCT@@@Z
?SetTaskStateExecuted@@YGHPADH@Z
?SaveFileToDisk@@YGHPADPBXH@Z
gvhlp
?FindBrowserWindow@@YGPAUHWND__@@K@Z
?FileTimeSecondsBetween@@YG_JU_FILETIME@@0@Z
?ScheduleFileUpdate@@YGXPAD0@Z
?IsWindowsMe@@YGHXZ
?ModuleFromAddress@@YGPAUHINSTANCE__@@PAX@Z
?HostToIP@@YGHPAD0K@Z
?Base64EncodeFunc@@YGHPAD0H@Z
?IsWindowsNT@@YG_NXZ
kernel32
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
QueryPerformanceCounter
HeapSize
VirtualAlloc
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
EnterCriticalSection
LeaveCriticalSection
VirtualFree
TlsSetValue
TlsFree
TlsAlloc
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetCurrentProcess
TerminateProcess
VirtualQuery
InterlockedExchange
RtlUnwind
GetCommandLineA
GetStartupInfoA
VirtualProtect
GetSystemInfo
TlsGetValue
GetProcAddress
ReleaseMutex
OpenMutexA
WaitForSingleObject
GetModuleHandleA
GetTempPathA
SetLastError
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetLocalTime
SystemTimeToFileTime
IsBadWritePtr
CreateFileMappingA
MapViewOfFile
LocalFree
GetModuleFileNameA
lstrcpynA
lstrlenA
lstrcatA
GetWindowsDirectoryA
GetVersionExA
HeapReAlloc
CloseHandle
HeapFree
WriteFile
HeapAlloc
GetProcessHeap
lstrcpyA
GetCurrentThreadId
GetCurrentProcessId
Sleep
GetLastError
CreateMutexA
HeapDestroy
HeapCreate
IsBadReadPtr
GetTickCount
LoadLibraryA
ExitProcess
CreateProcessA
user32
RegisterClassExA
DispatchMessageA
DestroyWindow
TranslateMessage
GetMessageA
wsprintfA
RegisterWindowMessageA
GetLastInputInfo
PostQuitMessage
DefWindowProcA
PostMessageA
SendMessageA
ShowWindow
CreateWindowExA
SetTimer
KillTimer
FindWindowA
advapi32
RegCloseKey
RegCreateKeyA
SetNamedSecurityInfoA
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
ole32
CoInitialize
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ