c:\src\tools\Branch\MIP\16.3.2\release\MicrogamingInstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0d8a364ff7d179f7265c1fb318c3512e_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
0d8a364ff7d179f7265c1fb318c3512e_JaffaCakes118
-
Size
806KB
-
MD5
0d8a364ff7d179f7265c1fb318c3512e
-
SHA1
af22df403efdfd837783ed41e08e2b7124a53425
-
SHA256
d61d01990094487d86d33757bdf347d704a74aec858d29351e84818ed4cdf08f
-
SHA512
d2733fbbe2ce9949631dee06ba650352a1a607783f4242cfdc7b3461685d46367456a43fa47008a8bbaeec27464cb604c53fd27d8d7c184ea7de82972151f2ae
-
SSDEEP
12288:e+GV5YT/mKhImZgz9otmEZhc7JxLKAGtlzf10ZzO6oCW9EKbcKE:e+GGJImZgJosEZhcVxLKAGtlFOKYL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d8a364ff7d179f7265c1fb318c3512e_JaffaCakes118
Files
-
0d8a364ff7d179f7265c1fb318c3512e_JaffaCakes118.exe windows:5 windows x86 arch:x86
b7ac3bf8e59714361338787c069207d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameW
MultiByteToWideChar
FindFirstFileA
GetProcAddress
FindClose
RemoveDirectoryW
FindNextFileA
GetModuleHandleA
ReleaseMutex
GetVersionExA
DeleteFileW
SetEvent
GetPrivateProfileStringW
CreateEventA
CreateDirectoryA
CreateMutexA
OutputDebugStringA
FreeLibrary
LoadLibraryA
LocalFree
lstrcpynA
GetDriveTypeA
GetVolumeInformationA
DeviceIoControl
MoveFileExA
Process32First
GetFileAttributesA
TerminateProcess
GetSystemDirectoryA
GetLastError
GetLocalTime
Process32Next
CreateToolhelp32Snapshot
lstrlenA
lstrcpynW
GetFileAttributesW
lstrlenW
lstrcpyA
MapViewOfFile
InterlockedIncrement
GetPrivateProfileIntA
InterlockedExchange
InterlockedExchangeAdd
CreateFileMappingA
GetExitCodeThread
WaitForMultipleObjects
GetCurrentThreadId
CreateThread
SetEndOfFile
LeaveCriticalSection
EnterCriticalSection
SetLastError
CreateSemaphoreA
CreateFileW
ReleaseSemaphore
GetLogicalDriveStringsA
GlobalMemoryStatusEx
GetSystemInfo
GetDiskFreeSpaceExA
ReadFile
SetThreadPriority
GetThreadTimes
ResumeThread
CompareStringW
CompareStringA
GetTimeZoneInformation
GetProcessHeap
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapSize
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
PeekNamedPipe
GetFileInformationByHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
LCMapStringW
LCMapStringA
HeapCreate
VirtualAlloc
VirtualFree
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStdHandle
InterlockedDecrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
FileTimeToLocalFileTime
FileTimeToSystemTime
MoveFileA
FormatMessageW
CopyFileW
WideCharToMultiByte
GetVolumePathNameW
WriteFile
FormatMessageA
GetEnvironmentVariableA
CreateDirectoryW
SetFilePointer
GetFileSize
GetComputerNameA
DeleteFileA
GetTempPathA
CreateFileA
GetCurrentProcessId
CloseHandle
GetModuleFileNameA
GetTempFileNameA
CopyFileA
RemoveDirectoryA
lstrcmpiA
CreateProcessA
Sleep
OpenProcess
WaitForSingleObject
CreateProcessW
GetCurrentThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
HeapReAlloc
HeapFree
ExitThread
GetSystemTimeAsFileTime
HeapAlloc
ExitProcess
GetModuleHandleW
SetFileAttributesA
user32
UpdateWindow
MapWindowPoints
LoadImageA
IsWindowVisible
GetSystemMetrics
RegisterClassW
MessageBoxW
DispatchMessageA
CreateWindowExW
CreatePopupMenu
SetLayeredWindowAttributes
GetCursorPos
SetWindowPos
CreateWindowExA
InvalidateRect
EnableWindow
OffsetRect
ChildWindowFromPoint
TranslateMessage
IsDialogMessageA
SendMessageA
SetFocus
GetClientRect
IsWindowEnabled
LoadIconA
SetForegroundWindow
GetWindowLongW
GetWindowDC
TrackPopupMenu
SetActiveWindow
GetWindowRect
AdjustWindowRect
LoadCursorA
GetDlgCtrlID
DefWindowProcW
MoveWindow
SetWindowLongA
FlashWindowEx
DefWindowProcA
ShowWindow
GetMessageA
DestroyWindow
wvsprintfA
GetActiveWindow
ReleaseDC
PeekMessageA
AppendMenuW
RegisterClassA
wsprintfW
PostMessageA
SetWindowTextA
wsprintfA
MessageBoxA
SetWindowLongW
CopyRect
PostThreadMessageA
gdi32
DeleteDC
CreateDIBSection
GetDIBits
DeleteObject
SelectObject
CreateCompatibleDC
GetStockObject
BitBlt
advapi32
RegCloseKey
RegQueryValueW
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyW
OpenSCManagerA
CloseServiceHandle
OpenServiceA
RegSetValueExW
RegQueryValueExW
RegSetValueW
RegSetValueA
FreeSid
GetUserNameA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
shell32
SHGetFolderPathW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
Shell_NotifyIconA
SHGetSpecialFolderPathA
SHChangeNotify
ShellExecuteA
ole32
CoCreateGuid
OleUninitialize
CoTaskMemAlloc
OleInitialize
OleCreate
OleSetContainedObject
CoTaskMemFree
StringFromIID
CLSIDFromProgID
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
VariantTimeToSystemTime
VariantCopy
VariantChangeType
VariantInit
VariantClear
SysAllocString
SysFreeString
SysAllocStringLen
SysStringLen
wsock32
getservbyport
WSAStartup
gethostbyname
gethostbyaddr
inet_addr
ioctlsocket
htonl
WSAGetLastError
htons
ntohs
WSASetLastError
getservbyname
WSACleanup
wininet
HttpQueryInfoA
InternetConnectA
InternetQueryOptionA
HttpSendRequestA
HttpOpenRequestA
InternetGetLastResponseInfoA
InternetSetOptionA
InternetReadFile
InternetOpenUrlW
InternetOpenW
InternetCreateUrlA
InternetCrackUrlW
InternetCloseHandle
InternetOpenA
InternetCrackUrlA
InternetOpenUrlA
shlwapi
PathAppendA
SHDeleteKeyA
PathCanonicalizeW
PathAppendW
StrStrA
UrlGetPartA
psapi
GetModuleFileNameExA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ws2_32
WSAAddressToStringA
urlmon
CoInternetGetSession
Exports
Exports
?CreateDefaultBrowserInfo@@YGPAVIDefaultBrowserInfo@@XZ
?CreateDirectXVersionInfo@@YGPAVIDirectXVersionInfo@@XZ
?CreateDisplaysDeviceInfo@@YGPAVIDisplayDevicesInfo@@XZ
?CreateFixedDriveInfo@@YGPAVIFixedDriveInfo@@XZ
?CreateFixedDrivesInfo@@YGPAVIFixedDrivesInfo@@XZ
?CreateFlashInfo@@YGPAVIFlashInfo@@XZ
?CreateIEVersionInfo@@YGPAVIIEVersionInfo@@XZ
?CreateMacAddress@@YGPAVIMacAddress@@XZ
?CreateMachineInfo@@YGPAVIMachineInfo@@XZ
?CreateMachineInfoXML@@YGPAVIMachineInfoXML@@XZ
?CreateOSInfo@@YGPAVIOSInfo@@XZ
?CreateProcessorsInfo@@YGPAVIProcessorsInfo@@XZ
?CreateRamInfo@@YGPAVIRamInfo@@XZ
?CreateSoundDevicesInfo@@YGPAVISoundDevicesInfo@@XZ
?CreateUserExperience@@YGPAVIUserExperience@@XZ
?CreateVMInfo@@YGPAVIVMInfo@@XZ
Sections
.text Size: 341KB - Virtual size: 341KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ