d:\LocalSvnForDailyBuild\dabingusa_beta\Bin\Release\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1921b391ebe2cb14a967bc2c89accf30_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1921b391ebe2cb14a967bc2c89accf30_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1921b391ebe2cb14a967bc2c89accf30_JaffaCakes118
-
Size
236KB
-
MD5
1921b391ebe2cb14a967bc2c89accf30
-
SHA1
2e884b8c5397bb5d6038694fc1ff2885c906b20e
-
SHA256
44550b40ec8d0aea32ee59c1cb169b27991b5d1f723057bfc73a080c0df84729
-
SHA512
e63d6a500ae53f8b53d236401b61102da3d41a1a0d8f9afcd00a26bb1edc8b27028af078010edebc93dd77c3375b2521addef8d14dc3e499adc73b00d3c0423a
-
SSDEEP
3072:+mpmjE5J/2EYl98cy8etxrIORLYm0y7daN/xTYEeNasHUjJtwqA6T5o:DpmjE5p2ECJENz0y7dA1jEqu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1921b391ebe2cb14a967bc2c89accf30_JaffaCakes118
Files
-
1921b391ebe2cb14a967bc2c89accf30_JaffaCakes118.exe windows:4 windows x86 arch:x86
89a129d37f5549f9e35d4f851cd11679
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetFilePointer
FlushFileBuffers
GetCurrentProcess
GetFullPathNameA
GetSystemTimeAsFileTime
VirtualAlloc
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitProcess
RtlUnwind
RaiseException
WriteConsoleW
GetFileType
GetStdHandle
WriteFile
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
LoadLibraryW
GetTimeZoneInformation
GetDriveTypeA
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
SetEnvironmentVariableA
ReadFile
GetThreadLocale
SetErrorMode
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
InterlockedDecrement
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
SetLastError
lstrcmpW
GetModuleHandleA
GetProcAddress
GetVersionExA
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetFileSize
lstrlenA
CompareStringA
MultiByteToWideChar
CompareStringW
GetVersion
InterlockedExchange
GetTickCount
WritePrivateProfileStringA
GetModuleFileNameA
GetLastError
GetProfileStringA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
CreateProcessA
SetCurrentDirectoryA
CopyFileA
Sleep
WriteProfileStringA
DeleteFileA
GetCurrentThreadId
HeapSize
user32
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
SetWindowTextA
GetWindowThreadProcessId
IsWindowEnabled
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
UnregisterClassA
LoadCursorA
GetSysColorBrush
DestroyMenu
PostQuitMessage
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
MessageBoxA
GetClientRect
GetSystemMetrics
SendMessageA
IsIconic
LoadIconA
EnableWindow
GetClassNameA
GetWindowTextA
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
SetBkColor
SetTextColor
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 164KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ