e:\Projects\source\winsrc_av7_Q108\avcontrol-oem\controlcenter\ReleaseUNICODE\ControlCenter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
18a23779428d496f1f7dd34a3f6b4e54_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
18a23779428d496f1f7dd34a3f6b4e54_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
18a23779428d496f1f7dd34a3f6b4e54_JaffaCakes118
-
Size
372KB
-
MD5
18a23779428d496f1f7dd34a3f6b4e54
-
SHA1
f246da309434fbc76e1ed4fe2921fbc9be2d080d
-
SHA256
56166f779a9f804df8751acabbc6163cb941ed33e212e5f8948e7fedf5d45641
-
SHA512
55af78293b6ed254def7d7b361390341e8565dc6e576c8130b0391aa4d7594d3544acd0b3c2d226fd312b52801f8db8b13794d9b88af2ab98d6ef26df7ad1f94
-
SSDEEP
6144:RTRXhxRL8XRW+jKkqmAsHCpA8HGzrlXZx/T5aQuBOBhcH6gw0CW:Rd79kqkCpA8UTx/T9vBOU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18a23779428d496f1f7dd34a3f6b4e54_JaffaCakes118
Files
-
18a23779428d496f1f7dd34a3f6b4e54_JaffaCakes118.exe windows:4 windows x86 arch:x86
b7381015dc6ec7b1f33fc975121bc273
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc71u
ord5388
ord985
ord1384
ord2257
ord6157
ord2723
ord2674
ord3058
ord6147
ord5511
ord4494
ord4361
ord2139
ord6253
ord3785
ord6083
ord2793
ord3930
ord4357
ord4664
ord4193
ord1355
ord4206
ord1609
ord2709
ord604
ord350
ord4573
ord5199
ord1785
ord5698
ord977
ord3661
ord718
ord516
ord4574
ord3662
ord3547
ord2422
ord721
ord528
ord6116
ord4577
ord4313
ord558
ord4094
ord2085
ord3238
ord1946
ord1058
ord5398
ord2460
ord1002
ord1472
ord6140
ord899
ord2155
ord3645
ord2860
ord2083
ord1632
ord1562
ord4232
ord2952
ord3224
ord760
ord572
ord658
ord3869
ord5867
ord2364
ord5119
ord3249
ord593
ord334
ord5118
ord3678
ord3756
ord3198
ord2086
ord1582
ord4234
ord2985
ord3311
ord741
ord3395
ord651
ord416
ord4101
ord2260
ord2361
ord2788
ord1555
ord5829
ord3467
ord1628
ord1549
ord4230
ord642
ord4945
ord3281
ord3155
ord3296
ord1270
ord5633
ord2521
ord5607
ord6056
ord5604
ord6050
ord4155
ord6053
ord5884
ord6033
ord5723
ord5638
ord5643
ord5519
ord5584
ord5410
ord5397
ord5917
ord265
ord3174
ord602
ord6058
ord347
ord2081
ord3208
ord2066
ord3995
ord4117
ord5637
ord502
ord2255
ord2074
ord5636
ord326
ord5630
ord5862
ord3396
ord2876
ord2867
ord5869
ord3635
ord605
ord354
ord3280
ord1920
ord5640
ord589
ord1416
ord330
ord6115
ord3590
ord1091
ord1190
ord4314
ord3417
ord2077
ord1536
ord4226
ord3158
ord587
ord5414
ord777
ord1921
ord3706
ord3192
ord380
ord3990
ord5558
ord5524
ord287
ord5485
ord290
ord2261
ord3289
ord722
ord530
ord3497
ord6001
ord5710
ord1113
ord1086
ord1244
ord3857
ord4035
ord3946
ord5440
ord751
ord2471
ord1461
ord1586
ord562
ord2932
ord4100
ord894
ord2121
ord1959
ord2254
ord5327
ord6293
ord5316
ord6282
ord4074
ord5705
ord277
ord2863
ord2277
ord2321
ord1641
ord1585
ord4237
ord3318
ord3670
ord748
ord2089
ord2977
ord1156
ord630
ord3082
ord2012
ord1198
ord385
ord1003
ord5434
ord1864
ord5865
ord4078
ord1476
ord2926
ord282
ord1479
ord280
ord4347
ord4642
ord2651
ord5609
ord3064
ord2421
ord4729
ord5727
ord501
ord709
ord4743
ord1051
ord2167
ord1299
ord1894
ord4119
ord2365
ord1274
ord2362
ord1271
ord3157
ord1925
ord3204
ord1079
ord1176
ord1049
ord283
ord774
ord577
ord2011
ord776
ord2461
ord2366
ord1118
ord293
ord2311
ord1908
ord266
ord2239
ord746
ord566
ord5113
ord3327
ord4255
ord4475
ord3943
ord2638
ord3703
ord3713
ord3712
ord2527
ord2640
ord2534
ord2832
ord2708
ord4301
ord2829
ord2725
ord2531
ord5562
ord5209
ord5226
ord4562
ord3942
ord5222
ord5220
ord2925
ord1911
ord3826
ord5378
ord6215
ord5096
ord1007
ord3800
ord3698
ord2812
ord3894
ord1975
ord2632
ord3434
ord3634
ord2648
ord4312
ord4120
ord896
ord6232
ord1883
ord3287
ord4714
ord5207
ord4730
ord4207
ord4184
ord4838
ord4861
ord4611
ord4791
ord5064
ord5066
ord5065
ord4112
ord4109
ord6061
ord6063
ord1021
ord1386
ord6086
ord3331
ord5210
ord3176
ord4256
ord1513
ord4276
ord1392
ord5908
ord1542
ord1661
ord1662
ord4884
ord5178
ord5208
ord4266
ord4480
ord2856
ord5196
ord1590
ord1646
ord1647
ord1955
ord5171
ord1353
ord4961
ord3339
ord6275
ord3796
ord6273
ord1512
ord2163
ord2169
ord2399
ord2381
ord2379
ord2397
ord2409
ord2386
ord2402
ord2407
ord2390
ord2392
ord2394
ord2388
ord2404
ord2384
ord931
ord927
ord929
ord925
ord920
ord5229
ord5231
ord5956
ord1591
ord4274
ord4716
ord3397
ord4179
ord6271
ord5067
ord1899
ord5148
ord4238
ord1393
ord3940
ord1608
ord1611
ord5911
ord1573
ord5579
ord2009
ord2054
ord4320
ord6274
ord3795
ord6272
ord4008
ord4032
ord757
ord762
ord764
ord3677
ord4535
ord2027
ord1318
ord5715
ord3050
msvcr71
_except_handler3
wcslen
wcsncpy
__CxxFrameHandler
?_set_se_translator@@YAP6AXIPAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z
_waccess
free
_wcsdup
exit
_wcsupr
_wsplitpath
??1exception@@UAE@XZ
??0exception@@QAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_wtoi
wcscmp
time
wcscpy
wcscat
mbstowcs
calloc
swprintf
wcschr
_wcsnicmp
_wcsicmp
malloc
wcsstr
_wchdir
_wgetcwd
wcsrchr
_snwprintf
wcsncmp
fclose
_wfopen
vswprintf
printf
_wmakepath
strncpy
wcsncat
swscanf
memmove
wcstok
srand
rand
fopen
fread
fwrite
ftell
fseek
memset
_c_exit
_exit
_XcptFilter
_cexit
_wcmdln
_amsg_exit
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__dllonexit
_onexit
__security_error_handler
_controlfp
kernel32
GetVersionExA
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
ExitProcess
GetModuleHandleA
CreateFileA
LoadLibraryA
CopyFileW
lstrcpynW
MoveFileW
SetFileAttributesW
WaitForSingleObject
GetPrivateProfileIntW
GetCPInfo
FindResourceW
LoadResource
LockResource
GetVersion
GetDateFormatW
GetTempPathW
GetPrivateProfileStringW
RemoveDirectoryW
OutputDebugStringW
CompareFileTime
lstrcmpW
FindNextFileW
FindFirstFileW
FindClose
lstrcmpiW
GetFullPathNameW
WideCharToMultiByte
MultiByteToWideChar
GetFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
lstrlenW
GetFileAttributesW
CreateDirectoryW
GetModuleHandleW
GetCurrentThread
LocalAlloc
FormatMessageW
GetCurrentProcess
WriteFile
PulseEvent
GetSystemDirectoryW
DeleteFileW
GetWindowsDirectoryW
WritePrivateProfileStringW
GetTickCount
GetCurrentProcessId
DeviceIoControl
CreateFileW
GetStartupInfoW
LocalFree
CreateProcessW
LoadLibraryW
GetProcAddress
OpenProcess
GetLastError
FreeLibrary
lstrlenA
lstrcpyW
GetDriveTypeW
GlobalAlloc
GlobalLock
GlobalUnlock
SystemTimeToFileTime
SetEvent
InterlockedIncrement
CreateEventW
WaitForMultipleObjects
ResetEvent
InterlockedDecrement
Sleep
GetModuleFileNameW
OpenEventW
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
SendMessageW
CheckMenuItem
AppendMenuW
DeleteMenu
CreatePopupMenu
DrawIcon
UnionRect
FindWindowW
PostMessageW
BringWindowToTop
SetForegroundWindow
TranslateAcceleratorW
GetForegroundWindow
GetMenuItemInfoW
GetSysColorBrush
SystemParametersInfoW
GetDesktopWindow
ModifyMenuW
InsertMenuW
GetMenuState
GetMenuItemID
GetMenuItemCount
CreateMenu
LoadBitmapW
SetRect
LoadIconW
DrawIconEx
GetActiveWindow
GetLastActivePopup
LoadImageW
SetRectEmpty
FillRect
GetMenu
GetWindow
GetFocus
DrawEdge
GetSystemMetrics
DrawStateW
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
InflateRect
GetSysColor
KillTimer
ScreenToClient
ReleaseDC
GetDC
CopyRect
PeekMessageW
DispatchMessageW
TranslateMessage
ReleaseCapture
SetWindowLongW
LoadCursorW
SetCapture
UpdateWindow
PtInRect
SetCursor
wsprintfW
EnumWindows
GetWindowTextW
GetWindowThreadProcessId
InvalidateRect
SetMenu
GetSystemMenu
IsIconic
GetWindowRect
GetClientRect
SetTimer
GetMessagePos
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
LoadMenuW
GetSubMenu
RedrawWindow
RegisterWindowMessageW
DestroyIcon
GetParent
EnableWindow
IsMenu
PostQuitMessage
IsRectEmpty
IsWindow
MessageBoxW
gdi32
CreateDIBSection
DeleteDC
PatBlt
Rectangle
Ellipse
GetBkMode
SetPixel
GetPixel
RoundRect
CreatePen
SelectObject
RealizePalette
GetDeviceCaps
CreateRectRgn
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetCurrentObject
BitBlt
Polygon
GetBkColor
CreateCompatibleDC
CreateRectRgnIndirect
CreateCompatibleBitmap
GetTextExtentPoint32W
GetStockObject
CreateFontIndirectW
GetObjectW
DeleteObject
CreateSolidBrush
CreatePatternBrush
advapi32
RegCreateKeyExW
StartServiceW
QueryServiceStatus
OpenSCManagerW
CloseServiceHandle
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
ImpersonateSelf
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
QueryServiceConfigW
ControlService
OpenProcessToken
RegSetValueExW
OpenServiceW
shell32
SHGetMalloc
SHGetFileInfoW
DragQueryFileW
DragFinish
ShellExecuteW
SHGetDesktopFolder
comctl32
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_GetImageInfo
ImageList_GetIcon
_TrackMouseEvent
ImageList_GetImageCount
ImageList_AddMasked
ImageList_Draw
cclib
??0CCLCResString@@QAE@PAUHINSTANCE__@@PB_WH@Z
?loadColor@CCLCResString@@QAEKPB_W@Z
?MessageBoxW@CCLib@@SAHPAUHWND__@@PB_W1I@Z
?LoadImageW@CCLCResString@@SAPAXPB_WIIHHI@Z
?getMRCHandle@CCLCResString@@QAEPAUMRCLIB@@XZ
?LoadIconW@CCLCResString@@SAPAUHICON__@@PB_WI@Z
?Create@CCLCHeaderBmp@@UAEHPAVCWnd@@@Z
?GetMessageMap@CCLCHeaderBmp@@MBEPBUAFX_MSGMAP@@XZ
?SetColors@CCLCHeaderBmp@@QAEXPAUHBITMAP__@@K@Z
??0CCLCHeaderBmp@@QAE@IIPAVCWnd@@@Z
??1CCLCHeaderBmp@@UAE@XZ
?ReplaceVariable@CCLib@@SA?AV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@PB_W@Z
?LoadMasterRegKey@CCLCResString@@QAEPA_WXZ
??1CCLCLicense@@QAE@XZ
??0CCLCLicense@@QAE@PA_W@Z
?LoadStringEx@CCLCResString@@QAAPA_WPB_WZZ
?getDays@CCLCLicense@@QAEHXZ
?getSerial@CCLCLicense@@QAEPA_WXZ
?getVendor@CCLCLicense@@QAEPA_WXZ
?getDate@CCLCLicense@@QAEPA_WXZ
?getStatus@CCLCLicense@@QAEHXZ
?readKeyFileData@CCLCLicense@@QAEH_N@Z
??1CCLCFControl@@QAE@XZ
?isFeatureEnabled@CCLCFControl@@QAE_NK@Z
?VerifyPasswordHash@CCLib@@SA_NPB_W0@Z
?LoadFileName@CCLCResString@@QAEPA_WPB_W@Z
??1CCLCButton@@UAE@XZ
??0CCLCButton@@QAE@XZ
?getFileInfo@CCLib@@SA_NPB_WPAUCCLIB_FILEINFO@@@Z
?ShowHelp@CCLib@@SA_NK@Z
?Create@CCLCSubHeader@@UAEHPAVCWnd@@AAVCRect@@@Z
?GetMessageMap@CCLCSubHeader@@MBEPBUAFX_MSGMAP@@XZ
?SetColors@CCLCSubHeader@@QAEXKKK@Z
?SetText@CCLCSubHeader@@QAEKPB_W0@Z
?SetBkgrndBmp@CCLCSubHeader@@QAEXPAUHBITMAP__@@@Z
??0CCLCSubHeader@@QAE@IIPAVCWnd@@@Z
??1CCLCSubHeader@@UAE@XZ
?LoadResourceBitmapAndPalette@CCLCResString@@SAHPB_WIAAVCBitmap@@AAVCPalette@@@Z
?makeEngineTest@CCLCEngine@@SA_NXZ
?isLicenseValid@CCLCLicense@@QAE_NXZ
?getMaxVirusName@CCLCEngine@@SA?BHXZ
?getVirusList@CCLCEngine@@SA_NPAVCStringList@@@Z
??1CCLCResString@@QAE@XZ
?LoadStringW@CCLCResString@@QAEPA_WPB_W@Z
?loadResourceDll@CCLCResString@@QAE_NPB_W0@Z
?LoadStringW@CCLCResString@@QAA?AV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@IZZ
??0CCLCFControl@@QAE@XZ
?performSelfTest@CCLib@@SA_NPB_W0H@Z
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
cctpc
?addGroup@CTaskPanelSheet@@QAEPAVCTaskPanelCtrlItem@@PB_WHHPAVCPropertyPage@@@Z
?addIconToList@CTaskPanelSheet@@QAEHPAUHICON__@@@Z
?addItem@CTaskPanelSheet@@QAEPAVCTaskPanelCtrlItem@@PAV2@PB_WPAVCPropertyPage@@HH@Z
?OnInitDialog@CTaskPanelSheet@@MAEHXZ
?GetMessageMap@CTaskPanelSheet@@MBEPBUAFX_MSGMAP@@XZ
?GetRuntimeClass@CTaskPanelSheet@@UBEPAUCRuntimeClass@@XZ
??1CTaskPanelSheet@@UAE@XZ
??0CTaskPanelSheet@@QAE@XZ
?SetActivePage@CTaskPanelSheet@@QAEHH@Z
?GetActivePage@CTaskPanelSheet@@QAEPAVCPropertyPage@@XZ
Sections
.text Size: 220KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE