c:\src\Release\BestClick.pdb
Static task
static1
Behavioral task
behavioral1
Sample
19ccb0a32fc453abad84c0b05cc3b90e_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19ccb0a32fc453abad84c0b05cc3b90e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
19ccb0a32fc453abad84c0b05cc3b90e_JaffaCakes118
-
Size
156KB
-
MD5
19ccb0a32fc453abad84c0b05cc3b90e
-
SHA1
b5e9026bc8d9c3fc92729b40406c25821fcf2c2b
-
SHA256
1c2c74d936d7b33168bf3111493bfd82baf21aa564b1d0fcd620bb6fb1a2f6a7
-
SHA512
18fa36753f9d91e447e965efcff9f04fcaa22731785c4382a6a79f09a01aeab10aca88c7b63a6abd1f737645e2822a4c86a0f4ce5a376927bea9475f77dc0799
-
SSDEEP
3072:tI+mmiHBK9k76CbTCDSgDksrUsYeT/gqz4v8lRx:qmcK9kK9osrBKE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19ccb0a32fc453abad84c0b05cc3b90e_JaffaCakes118
Files
-
19ccb0a32fc453abad84c0b05cc3b90e_JaffaCakes118.exe windows:4 windows x86 arch:x86
ccd7154b0b65c96f166e5ae584931500
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MulDiv
HeapAlloc
FlushInstructionCache
GetCurrentProcess
lstrcmpA
WideCharToMultiByte
GetModuleFileNameA
GetModuleHandleA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetCurrentThreadId
Sleep
ExitProcess
ReadFile
GetFileSize
CreateFileA
GetSystemDirectoryA
GetSystemTime
WriteFile
DeleteFileA
GetProcAddress
LoadLibraryA
MoveFileA
GetTempFileNameA
SetPriorityClass
OpenProcess
GetCurrentProcessId
SetThreadPriority
GetCurrentThread
CreateProcessA
CopyFileA
MoveFileExA
ReleaseMutex
CreateMutexA
WriteProcessMemory
ReadProcessMemory
SetWaitableTimer
CreateWaitableTimerA
GetTickCount
OutputDebugStringA
GetLocalTime
SetFilePointer
CreateEventA
ResetEvent
SetEvent
TerminateThread
GetLastError
LockResource
FindResourceExA
GetTempPathA
CloseHandle
lstrlenW
GlobalAlloc
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
IsBadCodePtr
IsBadReadPtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
TerminateProcess
IsBadWritePtr
VirtualFree
HeapCreate
SetUnhandledExceptionFilter
QueryPerformanceCounter
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCommandLineA
GetStartupInfoA
ExitThread
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
LocalFree
HeapSize
HeapReAlloc
HeapDestroy
GlobalLock
GlobalUnlock
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetProcessHeap
HeapFree
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CreateThread
WaitForSingleObject
user32
UnregisterClassA
DefWindowProcA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
RegisterClassExA
LoadCursorA
GetClassInfoExA
RegisterWindowMessageA
GetSysColor
ReleaseCapture
GetWindowLongA
FillRect
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
IsWindowVisible
SetRect
SetWindowLongA
SetCapture
MessageBoxA
GetClientRect
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
GetDesktopWindow
CallWindowProcA
EndPaint
BeginPaint
SetFocus
GetWindow
IsChild
DestroyAcceleratorTable
SendMessageA
GetFocus
IsWindow
GetDlgItem
RedrawWindow
DestroyWindow
SetWindowPos
GetClassNameA
GetParent
CharNextA
CreateAcceleratorTableA
CreateWindowExA
wsprintfA
SetThreadDesktop
CreateDesktopA
FindWindowExA
CharLowerBuffA
GetWindowRect
PostMessageA
ClientToScreen
MsgWaitForMultipleObjects
IsWindowUnicode
GetMessageW
GetMessageA
TranslateMessage
DispatchMessageW
DispatchMessageA
PeekMessageA
gdi32
CreateDIBSection
DeleteObject
GetPixel
SelectObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetDeviceCaps
GetObjectA
GetStockObject
SetPixel
CreateSolidBrush
advapi32
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
StringFromGUID2
CoTaskMemAlloc
OleLockRunning
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
CoTaskMemRealloc
CoCreateGuid
oleaut32
SysAllocStringByteLen
DispCallFunc
SafeArrayUnlock
SafeArrayLock
VarBstrCmp
SafeArrayDestroy
SafeArrayCreate
VariantCopyInd
SafeArrayRedim
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
shlwapi
PathFindExtensionW
PathFindExtensionA
gdiplus
GdipCloneImage
GdipAlloc
GdipFree
GdiplusShutdown
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipSaveImageToFile
GdipDisposeImage
wininet
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
FindCloseUrlCache
ws2_32
htons
connect
send
gethostbyname
closesocket
WSAStartup
WSACleanup
socket
select
ioctlsocket
recv
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ