C:\build_server\Protector_v1_2_Branch\branches\protector_1_2_branch\googleclient\tactical\protector\build\opt\obj\exe\GoogleToolbarNotifier_unsigned.pdb
Static task
static1
Behavioral task
behavioral1
Sample
16830baea9ab65b3d064f94fa591f6ef_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16830baea9ab65b3d064f94fa591f6ef_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
16830baea9ab65b3d064f94fa591f6ef_JaffaCakes118
-
Size
158KB
-
MD5
16830baea9ab65b3d064f94fa591f6ef
-
SHA1
affc89cc1938a691ec971e1cb7de06788c6be8cb
-
SHA256
679dbccca0f2ad11fb196b7802f0a88c70e9a20135f08d2fdd8984671219ae6a
-
SHA512
dc9450df6862269382a1bd8b26739990673fde3ba4144b5470989747cb1e81b1fc328a8da9519a085ab7ba353024abe229fb0c3e2fc59ee9f69e7e9953330e9e
-
SSDEEP
3072:14BhwUUUayiiLXpkrr174iAdCdU7nT+Iklc6uCKZE:1W4siukrrh4igpnT+IdgK6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16830baea9ab65b3d064f94fa591f6ef_JaffaCakes118
Files
-
16830baea9ab65b3d064f94fa591f6ef_JaffaCakes118.exe windows:4 windows x86 arch:x86
0ece3dcf9e0677f84552887b367e4773
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentThreadId
GetCommandLineW
Sleep
CreateThread
lstrcatW
WaitForSingleObject
LeaveCriticalSection
GetCurrentProcess
FlushInstructionCache
GetProcessHeap
HeapAlloc
EnterCriticalSection
SetProcessWorkingSetSize
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetProcAddress
GetTempPathW
CreateFileW
GetCurrentProcessId
FlushFileBuffers
LoadLibraryW
TryEnterCriticalSection
GetStartupInfoW
CreateProcessW
SetUnhandledExceptionFilter
FormatMessageW
LocalFree
GetFileSize
SetFilePointer
ReadFile
CreateMutexW
OpenMutexW
ReleaseMutex
FindFirstFileW
FindNextFileW
FindClose
ExpandEnvironmentStringsW
WriteFile
GetTickCount
HeapFree
CompareStringW
CompareStringA
SetStdHandle
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
GetOEMCP
GetStringTypeW
GetStringTypeA
GetCPInfo
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
LCMapStringW
LCMapStringA
GetTimeZoneInformation
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
VirtualQuery
GetSystemInfo
VirtualProtect
WideCharToMultiByte
GetDateFormatA
ResetEvent
CloseHandle
RaiseException
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
GetTempFileNameW
GetFileAttributesW
SetEvent
CreateEventW
MoveFileExW
DeleteFileW
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetModuleFileNameW
GetLastError
GetModuleHandleW
lstrcpyW
lstrlenW
LoadLibraryExW
MultiByteToWideChar
lstrcpynW
GetTimeFormatA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
RtlUnwind
TerminateProcess
GetModuleHandleA
ExitProcess
lstrcmpiW
SetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapReAlloc
HeapSize
GetSystemTimeAsFileTime
FreeLibrary
user32
CharNextW
UnregisterClassW
PostQuitMessage
PeekMessageW
DispatchMessageW
RegisterClassExW
GetClassInfoExW
wsprintfW
LoadCursorW
DefWindowProcW
DestroyWindow
PostThreadMessageW
CharUpperW
SetWindowLongW
GetWindowLongW
CreateWindowExW
CallWindowProcW
SetTimer
KillTimer
GetAsyncKeyState
SetDlgItemTextW
LoadIconW
MsgWaitForMultipleObjects
EndDialog
DialogBoxParamW
GetActiveWindow
IsDlgButtonChecked
SetWindowPos
GetWindowRect
GetDlgItem
CheckDlgButton
SendDlgItemMessageW
wininet
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
InternetGetConnectedState
InternetOpenW
psapi
GetProcessMemoryInfo
advapi32
OpenProcessToken
RegCloseKey
ConvertSidToStringSidW
LookupAccountSidW
GetTokenInformation
RegDeleteKeyW
RegQueryValueExW
DeregisterEventSource
ReportEventW
RegisterEventSourceW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
ole32
CoUninitialize
CoRegisterClassObject
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CoRevokeClassObject
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
oleaut32
RegisterActiveObject
GetActiveObject
RevokeActiveObject
SysFreeString
LoadTypeLi
SysAllocString
RegisterTypeLi
UnRegisterTypeLi
VarUI4FromStr
shlwapi
SHDeleteKeyW
PathRemoveFileSpecW
PathFindExtensionW
Sections
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.WIN Size: 605B - Virtual size: 605B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE