c:\data\work\SpywareProVer2\Source\bin\release\AntiTrojanPro.pdb
Static task
static1
Behavioral task
behavioral1
Sample
19ecba4e3563bdda0440ca07292fbeb0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19ecba4e3563bdda0440ca07292fbeb0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
19ecba4e3563bdda0440ca07292fbeb0_JaffaCakes118
-
Size
11.1MB
-
MD5
19ecba4e3563bdda0440ca07292fbeb0
-
SHA1
e0f453a78189e415f2f2472f157ce37cf88d591d
-
SHA256
a2e99c3f018260c02a0a550feda2b9b645b1302d7d592dc197527cb8a3f74e8e
-
SHA512
d731e7df522f743fa8a3015234bbc572878f5ca6b76b6e747abe9d538891d3f91a4299380367228281269e62b469dff97e30b4220188cf01eac877cbe38c5cbb
-
SSDEEP
24576:SF/dFSsyZZ+3FJlN+u2ckMJweEAGC1jFcFH1lnbM5VtFS:0/d1yZZynH+u2ckMJBECuZ1xbmL8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19ecba4e3563bdda0440ca07292fbeb0_JaffaCakes118
Files
-
19ecba4e3563bdda0440ca07292fbeb0_JaffaCakes118.exe windows:4 windows x86 arch:x86
7e4ba4520153852985a9a647392a821e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesA
GetFileTime
SetErrorMode
GetTickCount
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapFree
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
SetStdHandle
GetFileType
HeapSize
VirtualFree
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetDriveTypeA
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentDirectoryA
GetThreadLocale
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
CloseHandle
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
GetModuleFileNameA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
GetSystemDirectoryA
HeapDestroy
HeapAlloc
HeapCreate
Sleep
FreeLibrary
DeleteFileA
WaitForSingleObject
GetExitCodeProcess
SetLastError
LoadLibraryA
GetProcAddress
GetModuleHandleA
LockResource
SizeofResource
LoadResource
FindResourceA
MultiByteToWideChar
GetVersion
GetLastError
InterlockedExchange
CompareStringW
CompareStringA
lstrlenA
WideCharToMultiByte
GetStdHandle
user32
PostThreadMessageA
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
DestroyMenu
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
CheckMenuItem
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
EndDialog
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetDlgItem
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
PeekMessageA
MapWindowPoints
ScrollWindow
SetScrollPos
SetForegroundWindow
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
SetScrollInfo
GetDlgCtrlID
CallWindowProcA
SetWindowPos
OffsetRect
EnableWindow
CharUpperA
SetTimer
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
DrawIcon
IsIconic
IsWindow
AppendMenuA
BeginPaint
DefWindowProcA
UnregisterClassA
DestroyWindow
DispatchMessageA
TranslateMessage
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
GetMessageA
UpdateWindow
ShowWindow
CopyAcceleratorTableA
CharNextA
GetPropA
GetSysColorBrush
SetCursor
CopyRect
GetMessagePos
ScreenToClient
PtInRect
KillTimer
LoadCursorA
LoadBitmapA
GetClientRect
GetParent
GetSysColor
InvalidateRect
PostMessageA
GetWindowRect
SetWindowRgn
SetWindowLongA
GetWindowLongA
SendMessageA
GetNextDlgTabItem
GetKeyState
SetCapture
ReleaseCapture
LoadIconA
MessageBoxA
GetSystemMenu
EnableMenuItem
DrawTextA
EndPaint
RegisterClassExA
GetSystemMetrics
CreateWindowExA
GetMenuState
gdi32
ScaleWindowExtEx
ExtSelectClipRgn
CreateBitmap
SetWindowExtEx
CreateRectRgnIndirect
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
CreateFontIndirectA
SelectObject
DeleteObject
DeleteDC
CreateRectRgn
BitBlt
GetPixel
CombineRgn
GetStockObject
GetObjectA
CreateCompatibleDC
msimg32
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegDeleteKeyA
RegDeleteValueA
RegQueryValueA
RegOpenKeyA
RegQueryValueExA
RegEnumValueA
RegEnumKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
SHGetFolderPathA
ShellExecuteA
comctl32
ImageList_Create
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRevokeClassObject
CoTaskMemFree
CoInitialize
CoCreateInstance
OleIsCurrentClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
OleFlushClipboard
oleaut32
VariantTimeToSystemTime
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
SystemTimeToVariantTime
SafeArrayDestroy
OleCreateFontIndirect
SysAllocString
VariantCopy
Sections
.text Size: 336KB - Virtual size: 333KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10.7MB - Virtual size: 10.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ