f:\sample\install\Release\install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1938114e75ebc356b271fb77afbd4ede_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1938114e75ebc356b271fb77afbd4ede_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1938114e75ebc356b271fb77afbd4ede_JaffaCakes118
-
Size
152KB
-
MD5
1938114e75ebc356b271fb77afbd4ede
-
SHA1
8ce7e74352cb8401313ccfd7c388f25d5867b01e
-
SHA256
e36ff4b49f164a2892f7fb19c3992b2767b73ca12d3e1eac1d8cf0a19b769938
-
SHA512
36a6df2f06bdf6161b488eb45b5b86f55c7aea6651c21a2174c7b4d2f4962c5449517efa5057e127e081745d6b4bec31da3b41326bd864161011a7b8fd3cfba0
-
SSDEEP
3072:RsRsnGr7dTAoojop5tSN+2cttZ2cAANaznUI3pABS2IoYlwL2y/dhP:OrHdTAVU5A/etZoANaUuf2fth
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1938114e75ebc356b271fb77afbd4ede_JaffaCakes118
Files
-
1938114e75ebc356b271fb77afbd4ede_JaffaCakes118.exe windows:4 windows x86 arch:x86
755aab4c69500c16164c55c854cc9d2d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
lstrcmpiA
LocalFree
lstrcpynA
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
SetLastError
CreateEventA
WaitForSingleObject
SetThreadPriority
ResumeThread
GetCurrentThreadId
SetEvent
SuspendThread
RaiseException
GetVersion
InterlockedIncrement
GetModuleFileNameA
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
lstrcmpA
GetProcAddress
GetModuleHandleA
lstrcmpW
lstrcatA
FreeLibrary
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GlobalFlags
lstrcpyA
GetCPInfo
GetOEMCP
FlushFileBuffers
GetCurrentProcess
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitThread
HeapSize
TerminateProcess
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetLastError
CreateThread
DeleteFileA
SetFilePointer
WriteFile
CreateFileA
GetFileSize
ReadFile
CloseHandle
GetTempPathA
FindResourceA
LoadResource
LockResource
SizeofResource
Sleep
GetExitCodeThread
TerminateThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedDecrement
InterlockedExchange
user32
GetDlgItem
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassInfoExA
GetClassLongA
GetCapture
WinHelpA
RegisterWindowMessageA
SetWindowTextA
DestroyMenu
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
GetDlgCtrlID
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
SetMenuItemBitmaps
GetTopWindow
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowTextA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CharLowerA
PostMessageA
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
SendMessageA
MessageBoxA
SetTimer
KillTimer
DefWindowProcA
PostQuitMessage
EndPaint
BeginPaint
RegisterClassExA
LoadCursorA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetFocus
GetSystemMetrics
advapi32
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
comctl32
ord17
wininet
InternetSetOptionA
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
ws2_32
WSACleanup
WSAStartup
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
CreateBitmap
GetStockObject
ScaleViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
SaveDC
RestoreDC
DeleteDC
SetTextColor
SetMapMode
GetClipBox
DeleteObject
SetBkColor
PtVisible
RectVisible
TextOutA
ExtTextOutA
SetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
GetDeviceCaps
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ