e:\onegg\project\sd2\app\Defender\Release\Defender.pdb
Static task
static1
Behavioral task
behavioral1
Sample
215fdb32dda49668c242fadcf9554fc4_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
215fdb32dda49668c242fadcf9554fc4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
215fdb32dda49668c242fadcf9554fc4_JaffaCakes118
-
Size
877KB
-
MD5
215fdb32dda49668c242fadcf9554fc4
-
SHA1
70d11cc065b9f585a08040a889f8b622648ada34
-
SHA256
e0cf3f33e466642e26b33718fb251663b6cc2e206b3fed16f339420683a2b8ad
-
SHA512
2437e651027a3984ec8eca0ee176865fa099522b262848f5fdce12a721b3757cbae8babfe2a62dc61d171c32b025c7d55cb929f2735a5780f7dea63c506f44b9
-
SSDEEP
24576:Ou7BVBsSQKwwiJABiYS3EmLkYyoJi8vqiqPi:3toKvMAM3Di8vT1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 215fdb32dda49668c242fadcf9554fc4_JaffaCakes118
Files
-
215fdb32dda49668c242fadcf9554fc4_JaffaCakes118.exe windows:5 windows x86 arch:x86
09f92f9014d4bf5c01711faca111414f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
DeleteCriticalSection
TlsFree
InterlockedIncrement
GlobalFlags
SetErrorMode
GetFileAttributesW
GetFileTime
GetTickCount
GetStartupInfoW
RtlUnwind
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
RaiseException
HeapReAlloc
ExitProcess
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
LocalReAlloc
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetCurrentDirectoryA
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
CreateEventW
SetEvent
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameW
DuplicateHandle
GetFileSize
UnlockFile
LockFile
GetThreadLocale
lstrlenA
lstrcmpA
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
lstrcmpW
GetVersionExA
InterlockedDecrement
GetCurrentProcessId
GetModuleHandleA
GlobalFree
WaitForMultipleObjects
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
SetFilePointerEx
GlobalAlloc
MulDiv
LoadLibraryA
ExpandEnvironmentStringsA
GetDriveTypeW
WideCharToMultiByte
GetSystemTime
SystemTimeToFileTime
GetFileAttributesExW
WriteFile
SetFileTime
GetVolumeNameForVolumeMountPointW
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
RemoveDirectoryW
FindNextFileW
CreateDirectoryW
SetFilePointer
SetEndOfFile
CopyFileExW
GetProcessHeap
GetFileSizeEx
FlushFileBuffers
DeviceIoControl
ReadFile
GetVolumeInformationW
GetDiskFreeSpaceW
FreeResource
Sleep
GlobalLock
GlobalUnlock
MultiByteToWideChar
lstrcatW
lstrlenW
CreateProcessW
lstrcpyW
WritePrivateProfileStringW
GetPrivateProfileIntW
CreateMutexW
GetCurrentThread
SetThreadPriority
GetPrivateProfileStringW
SetLastError
GetModuleFileNameW
CreateFileW
OutputDebugStringW
GetCurrentProcess
GetCommandLineW
CreateThread
WaitForSingleObject
GetExitCodeThread
CloseHandle
GetLastError
FormatMessageW
LocalLock
LocalFree
SetFileAttributesW
CopyFileW
GetVersionExW
DeleteFileW
GetWindowsDirectoryW
FindFirstFileW
FindClose
LoadLibraryW
GetProcAddress
FreeLibrary
SuspendThread
ResumeThread
GetModuleHandleW
FindResourceW
LoadResource
LockResource
SizeofResource
QueryPerformanceCounter
user32
IsRectEmpty
CharNextW
UnregisterClassW
GetSysColorBrush
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetMessageW
ValidateRect
CharUpperW
GetCursorPos
WindowFromPoint
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
EndDialog
MoveWindow
SetWindowTextW
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
SetPropW
GetPropW
RemovePropW
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
SetRect
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
SetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
UnhookWindowsHookEx
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
EndPaint
BeginPaint
CopyAcceleratorTableW
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetMenuState
GetMenuItemID
GetMenuItemCount
LoadMenuW
ModifyMenuW
GetSubMenu
GetWindow
DrawIconEx
GetClipboardData
CloseClipboard
InvalidateRgn
GetNextDlgGroupItem
RegisterClipboardFormatW
PostThreadMessageW
OpenClipboard
TranslateMessage
DispatchMessageW
GetMessageTime
SetWindowLongW
LoadCursorW
CopyIcon
MessageBeep
IsWindow
RedrawWindow
ReleaseDC
GetDC
GetWindowRect
InflateRect
SetCursor
GetNextDlgTabItem
SetFocus
PostQuitMessage
GetSystemMetrics
KillTimer
SetTimer
IsWindowVisible
IsIconic
DrawIcon
FindWindowW
ShowWindow
SetActiveWindow
SetForegroundWindow
MessageBoxW
UpdateWindow
ExitWindowsEx
LoadIconW
GetClassNameW
GetKeyState
GetWindowLongW
GetFocus
PostMessageW
ReleaseCapture
PtInRect
GetParent
SetCapture
GetClientRect
SendMessageW
OffsetRect
GetSysColor
EnableWindow
InvalidateRect
LoadBitmapW
CopyRect
GetClassLongW
gdi32
ExtSelectClipRgn
CreateBitmap
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
RectVisible
PtVisible
GetWindowExtEx
CreateSolidBrush
SelectObject
DeleteDC
DeleteObject
MoveToEx
LineTo
GetClipBox
SetMapMode
SetBkColor
RestoreDC
SaveDC
RoundRect
CreatePen
GetStockObject
GetDeviceCaps
CreateFontIndirectW
StretchBlt
GetObjectW
GetTextExtentPoint32W
SetTextColor
SetBkMode
TextOutW
Pie
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetPixel
CreateFontW
GetViewportExtEx
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegQueryValueExW
AdjustTokenPrivileges
RegSetValueExW
RegCreateKeyExW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegFlushKey
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
RegQueryValueW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
shell32
DragQueryFileW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetMalloc
CommandLineToArgvW
ShellExecuteW
SHChangeNotify
DragFinish
comctl32
_TrackMouseEvent
ord17
shlwapi
SHGetValueW
PathRemoveFileSpecW
PathFindExtensionW
PathStripToRootW
PathIsUNCW
PathSetDlgItemPathW
SHSetValueW
PathFindFileNameW
oledlg
OleUIBusyW
ole32
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
OleFlushClipboard
CoInitializeEx
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoRegisterMessageFilter
CLSIDFromProgID
CoCreateGuid
oleaut32
VariantInit
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
OleLoadPicture
SysStringLen
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
Sections
.text Size: 339KB - Virtual size: 338KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 425KB - Virtual size: 428KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE