D:\Development-2010\MaxResearch\Output\Win32\Release\PDB\MaxVmHandler.pdb
Static task
static1
Behavioral task
behavioral1
Sample
22212d97099f0ef10df2e973b42c5b06_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
22212d97099f0ef10df2e973b42c5b06_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
22212d97099f0ef10df2e973b42c5b06_JaffaCakes118
-
Size
709KB
-
MD5
22212d97099f0ef10df2e973b42c5b06
-
SHA1
6e1f17e5574af38faf703251c86d5440473e365e
-
SHA256
ce785a96349a5655037ea761d72193c5d8b8b4001cbe45ce558b4822d2c6cd99
-
SHA512
6adba41759e511bab90339463ea6f7ce691dbe7d5efd28e50ea86e7b7bf811e61fdb73ebd3e5570db9b2a2c224df054ec0e010ad283baeb96beecd417a525f3a
-
SSDEEP
12288:QWd5bJFf4ebflGzVvJyP3cKWUXZeeIsHE8lLls1ubEPmgRMEdP7:DD34zjHpjsHE8Dsk+Pj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22212d97099f0ef10df2e973b42c5b06_JaffaCakes118
Files
-
22212d97099f0ef10df2e973b42c5b06_JaffaCakes118.exe windows:5 windows x86 arch:x86
a7b8be5d8ce3b5a4b9440d50f766cc3b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
vix
Vix_GetErrorText
VixVM_GetNamedSnapshot
VixVM_RemoveSnapshot
VixHost_Connect
VixVM_Open
Vix_GetProperties
VixVM_CreateSnapshot
VixVM_GetCurrentSnapshot
VixVM_RevertToSnapshot
VixHost_Disconnect
VixVM_PowerOff
VixVM_PowerOn
VixJob_Wait
Vix_ReleaseHandle
shlwapi
StrTrimW
PathIsDirectoryW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathRemoveFileSpecW
PathIsUNCW
unrar
RARCloseArchive
RAROpenArchiveEx
RARProcessFileW
RARReadHeaderEx
RARSetCallback
kernel32
lstrcmpW
InterlockedExchange
CompareStringA
GetLocaleInfoW
lstrcmpA
EnumResourceLanguagesW
ConvertDefaultLocale
GetCurrentThread
GlobalDeleteAtom
GlobalAddAtomW
FreeResource
SetThreadPriority
SuspendThread
FileTimeToSystemTime
FileTimeToLocalFileTime
GetModuleHandleA
GetThreadLocale
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
GetVersionExA
LoadLibraryA
CompareStringW
GlobalFindAtomW
lstrlenA
GetFileAttributesExW
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
GlobalLock
GetFileTime
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GlobalFlags
GetCurrentDirectoryW
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
ExitThread
SetEnvironmentVariableW
SetCurrentDirectoryW
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
LCMapStringW
GetTimeFormatA
GetDateFormatA
GetCurrentDirectoryA
GetDriveTypeA
InitializeCriticalSectionAndSpinCount
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetExitCodeProcess
CreateFileA
SetEnvironmentVariableA
GlobalUnlock
FormatMessageW
MulDiv
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
SetVolumeLabelW
GetDiskFreeSpaceW
GetDriveTypeW
GetTickCount
FlushFileBuffers
GlobalFree
lstrlenW
GlobalAlloc
GetModuleHandleW
GetLocalTime
GetProcAddress
LoadLibraryW
SetUnhandledExceptionFilter
FreeLibrary
SetErrorMode
GetFileAttributesW
lstrcpynW
GetVersionExW
SetFilePointer
GetCurrentProcessId
ExpandEnvironmentStringsW
LocalFree
LocalAlloc
TerminateProcess
GetCurrentProcess
CreateProcessW
CreateThread
FindNextFileW
FindClose
OutputDebugStringW
InterlockedDecrement
FindFirstFileW
ResumeThread
ReleaseMutex
GetCurrentThreadId
MoveFileW
SetLastError
CreateFileW
ReadFile
WriteFile
GetProcessHeap
SleepEx
HeapFree
HeapAlloc
GetFileSize
SetFileAttributesW
DeleteFileW
CloseHandle
GetDiskFreeSpaceExW
DeleteCriticalSection
RemoveDirectoryW
CreateEventW
EnterCriticalSection
GetLastError
WritePrivateProfileStringW
MultiByteToWideChar
LeaveCriticalSection
CopyFileW
Sleep
WideCharToMultiByte
InitializeCriticalSection
SetEvent
GetComputerNameW
WaitForSingleObject
CreateDirectoryW
GetPrivateProfileSectionNamesW
GetCommandLineW
LockResource
GetPrivateProfileIntW
GetModuleFileNameW
SizeofResource
GetPrivateProfileStringW
LoadResource
FindResourceW
GetFileSizeEx
user32
ReleaseCapture
CharNextW
IsRectEmpty
SetRect
CopyAcceleratorTableW
InvalidateRect
InvalidateRgn
GetNextDlgGroupItem
UnregisterClassW
RegisterClipboardFormatW
PostThreadMessageW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
PtInRect
GetMenu
SetWindowLongW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
DestroyMenu
UnhookWindowsHookEx
CharUpperW
GetSysColor
SetCapture
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
SetFocus
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExW
CallNextHookEx
GetMessageW
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
MessageBoxW
SetCursor
PostMessageW
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
MessageBeep
GetSystemMenu
IsIconic
LoadCursorW
GetSysColorBrush
ShowWindow
DrawIcon
GetClientRect
LoadIconW
AppendMenuW
GetSystemMetrics
SendMessageW
EnableWindow
wsprintfW
MoveWindow
SetWindowTextW
IsDialogMessageW
EndPaint
TranslateMessage
gdi32
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
ScaleViewportExtEx
OffsetViewportOrgEx
GetBkColor
GetTextColor
GetRgnBox
GetMapMode
SelectObject
SetViewportExtEx
Escape
ExtTextOutW
TextOutW
RectVisible
GetObjectW
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateRectRgnIndirect
CreateBitmap
GetDeviceCaps
PtVisible
GetWindowExtEx
GetViewportExtEx
SetViewportOrgEx
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
RegLoadKeyW
RegQueryValueW
RegOpenKeyW
RegDeleteKeyW
RegEnumKeyW
RegSetValueExW
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
RegEnumKeyExW
RegOpenKeyExW
LookupPrivilegeValueW
RegQueryValueExW
RegCreateKeyExW
comctl32
InitCommonControlsEx
oledlg
OleUIBusyW
ole32
CoRevokeClassObject
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitializeEx
CLSIDFromString
CLSIDFromProgID
CoUninitialize
CoInitialize
CoCreateInstance
OleRun
CoTaskMemFree
OleIsCurrentClipboard
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
oleaut32
VariantTimeToSystemTime
VariantCopy
VariantInit
VariantChangeType
SysAllocStringLen
SysStringLen
SysFreeString
SafeArrayDestroy
OleCreateFontIndirect
VariantClear
SysAllocString
SystemTimeToVariantTime
VarUdateFromDate
GetErrorInfo
ws2_32
inet_addr
htonl
ntohl
htons
ntohs
connect
getpeername
select
inet_ntoa
shutdown
setsockopt
sendto
recv
bind
socket
getservbyname
__WSAFDIsSet
closesocket
send
listen
accept
gethostname
WSAStartup
WSACleanup
gethostbyname
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 425KB - Virtual size: 425KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 19KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE