d:\Development\firedrake\build\win\release\InDesign.pdb
Behavioral task
behavioral1
Sample
18b52653038ea9b94c1688bca1b7bd7c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
18b52653038ea9b94c1688bca1b7bd7c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
18b52653038ea9b94c1688bca1b7bd7c_JaffaCakes118
-
Size
2.1MB
-
MD5
18b52653038ea9b94c1688bca1b7bd7c
-
SHA1
f51015cc0920a0523f8f92298c32958472f459b4
-
SHA256
6c4b092e3e246d2a3a72cb42ce025b1440b897101d40b966df1217bd289a89d8
-
SHA512
2ff6bfe00432815ecb7e534eca06f959a57b1fa0709d6d1bb3b4328cb43654afee2c65616c1e698808fb80bca1c9f7c31adc0fa09d7e41520ba7b8f7eb09e28a
-
SSDEEP
49152:pT/Aw1tdwuphgMWxv932aG0aWfoIfrUXHSHdCCL:pT/A+tdQMWxvPCCL
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18b52653038ea9b94c1688bca1b7bd7c_JaffaCakes118
Files
-
18b52653038ea9b94c1688bca1b7bd7c_JaffaCakes118.exe windows:4 windows x86 arch:x86
581044ec91306c4fa97a619eb6d3477b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
objectmodel
?ShuksanInit@@YAPAVISession@@PAX0PADHAAHQA_W3ABVPMString@@44P6APAVIStartupScreen@@0@ZPAVIPlugIn@@@Z
?ShuksanTerminate@@YAFPAVIPlugIn@@@Z
pmruntime
??3@YAXPAX@Z
??2@YAPAXI@Z
public
?Contains@PMString@@QBEFABV1@J@Z
?AppendNumber@PMString@@QAEXJ@Z
?HasTranslation@BootStrapStrings@@SA_NABVPMLocaleId@@ABVPMString@@@Z
?Instance@GRUser@@SAPAV1@XZ
?GetSerialNumber@SerialNumberPrivate@@SA?AVPMString@@XZ
?GetCompanyName@SerialNumberPrivate@@SA?AVPMString@@XZ
?GetName@SerialNumberPrivate@@SA?AVPMString@@XZ
??0PMString@@QAE@XZ
?GetLocale@WLocaleSetting@@SA?AVPMLocaleId@@XZ
??1PMString@@QAE@XZ
??0PMString@@QAE@PBDFW4TranslationSpecifier@0@@Z
?GrabTString@PMString@@QAEPA_WXZ
?Release@ALMPrivate@@SAXXZ
?Initialize@CAlert@@SAXPAVAlertImplementation@@@Z
??1WCommandLineArgs@@UAE@XZ
??0WCommandLineArgs@@QAE@XZ
?Terminate@CCommandLineArgs@@UAEXXZ
?kNullString@@3VPMString@@B
?SetTranslatable@PMString@@QAEAAV1@F@Z
?Translate@BootStrapStrings@@SA?AVPMString@@ABVPMLocaleId@@ABV2@@Z
?GetResourceHandle@WinEnvironment@PublicLibGlobals@@YAPAXXZ
?Initialize@WCommandLineArgs@@UAEXPB_W@Z
?IsNull@PMString@@QBEFXZ
??4PMString@@QAEAAV0@ABV0@@Z
?ReplaceStringParameters@@YAXPAVPMString@@ABV1@111111@Z
??0PMString@@QAE@ABV0@@Z
widgetbin
?ReadPNGDataFromResource@SplashScreenUtils@@SAPAVSimpleDataHandler@@ABV?$IDType@UPluginID_tag@@@@ABK@Z
?CreateTransparentSystemWindow@SplashScreenUtils@@SAPAXABUtagRECT@@PAX1@Z
?GenerateOffScreenBitmap@SplashScreenUtils@@SAXPAXPAVSimpleDataHandler@@PAPAX22PAPAK@Z
?DrawSplashScreen@SplashScreenUtils@@SAXPAX0PAVSimpleDataHandler@@P6GH00PAUtagPOINT@@PAUtagSIZE@@02KPAU_BLENDFUNCTION@@K@Z@Z
?MarkRectOpaque@SplashScreenUtils@@SAXPAKHHPAUtagRECT@@@Z
?gStartupScreenVisible@@3FA
GetWidgetPlugIn
??0WClientAlertImpl@@QAE@XZ
kernel32
GetStartupInfoA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetModuleHandleA
ExitProcess
CreateEventW
SetEvent
GetVersionExW
LoadLibraryW
GetProcAddress
WaitForSingleObject
CloseHandle
FreeLibrary
GetTickCount
GetCommandLineW
GetSystemTimeAsFileTime
user32
GetActiveWindow
GetMessageW
TranslateMessage
DispatchMessageW
DestroyWindow
GetWindow
LoadIconW
RegisterClassW
CreateWindowExW
GetSystemMetrics
DrawTextW
DefWindowProcW
SendMessageW
ShowWindow
SetForegroundWindow
GetForegroundWindow
KillTimer
PostMessageW
SetWindowLongW
GetWindowLongW
SystemParametersInfoW
gdi32
SetTextColor
CreateFontIndirectW
GetStockObject
DeleteDC
DeleteObject
SelectObject
SetBkMode
msvcr71
wcscpy
wcslen
_purecall
_heapwalk
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_except_handler3
__security_error_handler
_onexit
__dllonexit
_beginthreadex
__CxxFrameHandler
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE