m:\Rebels\RebG12\install\tempunst\Release\tempunst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1c3b95e0163dcf4549a05ec5d3df0dd2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c3b95e0163dcf4549a05ec5d3df0dd2_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1c3b95e0163dcf4549a05ec5d3df0dd2_JaffaCakes118
-
Size
552KB
-
MD5
1c3b95e0163dcf4549a05ec5d3df0dd2
-
SHA1
8a5eb716af21c156c8293d493e1d94681b8c9965
-
SHA256
1151310684111d5d418b5b3a0469607079f864ef7cfcfdfbf9840be13c8d9d31
-
SHA512
f57e2e3423583f484282742206ea3e57633c03d547a5009fb426a62e6a0f11ab2a226212a95a33435b95e560cb54aeab10a069394a243bb23755b260a1d63a87
-
SSDEEP
6144:9L36HnzFtvpfN6mwb7IP5fsclEHcHecvK3E7wWCtSuuQDbAC/Pd4Jq/GlD6YeGra:Z3wjpNub+57lEHcHecvMPtFndoUyD68a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c3b95e0163dcf4549a05ec5d3df0dd2_JaffaCakes118
Files
-
1c3b95e0163dcf4549a05ec5d3df0dd2_JaffaCakes118.exe windows:4 windows x86 arch:x86
e7a773c56b6876056398f1589f7bb299
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemInfo
VirtualQuery
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
SetEnvironmentVariableA
SizeofResource
FindResourceA
InterlockedExchange
GetACP
IsBadCodePtr
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetHandleCount
GetFileType
SetStdHandle
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
SetUnhandledExceptionFilter
HeapSize
TerminateProcess
CreateThread
GetUserDefaultLangID
FindNextFileA
RemoveDirectoryA
MoveFileExA
OpenProcess
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
ExitThread
HeapReAlloc
GetCommandLineA
GetStartupInfoA
HeapAlloc
IsBadReadPtr
ExitProcess
HeapFree
RaiseException
RtlUnwind
SetErrorMode
GetShortPathNameA
CreateFileA
FindFirstFileA
FindClose
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
GetCurrentDirectoryA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
CloseHandle
FormatMessageA
LocalFree
VirtualProtect
lstrcpynA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpyA
GlobalLock
GlobalUnlock
InterlockedDecrement
GetFileAttributesA
SetFileAttributesA
SetLastError
GlobalAlloc
GlobalFree
GetProcAddress
LoadLibraryA
FreeLibrary
GetLocaleInfoA
CreateMutexA
WaitForSingleObject
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
GetLastError
MulDiv
WideCharToMultiByte
LoadResource
LockResource
GetVersionExA
GetThreadLocale
GetModuleHandleA
user32
MapDialogRect
GetActiveWindow
GetAsyncKeyState
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
LoadBitmapA
EnableWindow
SendMessageA
LoadStringA
GetParent
PostMessageA
DrawIcon
IsIconic
GetClientRect
LoadIconA
OffsetRect
GetWindowRect
ClientToScreen
MoveWindow
GetWindowLongA
GetClassNameA
CreateDialogIndirectParamA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
MessageBoxA
SendMessageTimeoutA
CopyRect
GetDC
ReleaseDC
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetDesktopWindow
wsprintfA
ValidateRect
GetCursorPos
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
EndDialog
GetSystemMetrics
GetNextDlgTabItem
UnhookWindowsHookEx
EnumWindows
ExitWindowsEx
GetWindowThreadProcessId
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ScreenToClient
BeginPaint
EndPaint
GetSysColor
GetWindow
PtInRect
GetWindowPlacement
TranslateMessage
GetMessageA
PostQuitMessage
SetCursor
DestroyMenu
GetSysColorBrush
EnumChildWindows
SetWindowPos
SystemParametersInfoA
LoadCursorA
gdi32
CreateBitmap
GetStockObject
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateDCA
CreateDIBitmap
DeleteDC
DeleteObject
GetDeviceCaps
EnumFontFamiliesExA
CreateFontIndirectA
winspool.drv
EnumPrintersA
EnumPrinterDriversA
ClosePrinter
OpenPrinterA
EnumJobsA
GetPrinterDriverDirectoryA
GetPrintProcessorDirectoryA
DocumentPropertiesA
advapi32
RegEnumKeyExA
RegQueryInfoKeyA
RegConnectRegistryA
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegEnumValueA
comctl32
CreatePropertySheetPageA
DestroyPropertySheetPage
PropertySheetA
ImageList_Create
ImageList_Destroy
ord17
ImageList_AddMasked
ImageList_GetImageCount
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 360KB - Virtual size: 357KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE