e:\2-7 DE\Bin\release\123.pdb
Static task
static1
Behavioral task
behavioral1
Sample
266645af02241f73fbd2fcc72e71ce9f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
266645af02241f73fbd2fcc72e71ce9f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
266645af02241f73fbd2fcc72e71ce9f_JaffaCakes118
-
Size
18.4MB
-
MD5
266645af02241f73fbd2fcc72e71ce9f
-
SHA1
fdcf93158dd3d048cc60ce340b8d8a6263904a63
-
SHA256
8e9ad9ce11c2395fc8ae632705effda5bfb869d1391f14a9eda422d4e9b21b59
-
SHA512
a9ae3d5b1b0a94fa40d9f5fb453b71c16d3725f7ef249323d70aed7663dece7730712ea8e62723cff3f01572ad8a2c1fd8a7a60a296e5e6399abd2a845381944
-
SSDEEP
196608:UsG6FV35ZmCU2ae60zwFV8LQU2ae6crbg1PDZ6zYFVP7j+i9FVx+:7FV3A2aenMFVc2aeXbEFVzjNFVQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 266645af02241f73fbd2fcc72e71ce9f_JaffaCakes118
Files
-
266645af02241f73fbd2fcc72e71ce9f_JaffaCakes118.exe windows:4 windows x86 arch:x86
4e5dbf0ec14079136a12f23f54fd8b62
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesA
GetFileTime
GetCurrentDirectoryA
GetTickCount
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
ExitProcess
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
SetStdHandle
GetFileType
VirtualFree
GetStdHandle
Sleep
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetDriveTypeA
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetErrorMode
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GetCurrentProcessId
InterlockedDecrement
GetModuleFileNameW
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GlobalAlloc
FormatMessageA
LocalFree
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
CloseHandle
GetCurrentProcess
lstrcpynA
GetVersionExA
CreateMutexA
GetModuleFileNameA
GetSystemDirectoryA
HeapCreate
HeapDestroy
FreeLibrary
ExpandEnvironmentStringsA
DeleteFileA
GetExitCodeProcess
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetProcessHeap
WaitForSingleObject
HeapFree
HeapAlloc
HeapReAlloc
GetModuleHandleA
LoadLibraryA
GetProcAddress
SetLastError
MulDiv
GetVersion
CompareStringA
LockResource
GetLastError
InterlockedExchange
lstrlenW
MultiByteToWideChar
CompareStringW
SizeofResource
WideCharToMultiByte
LoadResource
lstrlenA
FindResourceA
GetACP
user32
RegisterClipboardFormatA
PostThreadMessageA
MapDialogRect
PostQuitMessage
DestroyMenu
GetWindowThreadProcessId
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
PeekMessageA
MapWindowPoints
ScrollWindow
TrackPopupMenu
IsWindowVisible
GetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
SetScrollInfo
GetDlgCtrlID
CallWindowProcA
SetWindowPos
OffsetRect
IntersectRect
GetMenuItemID
GetMenuItemCount
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
GetDlgItem
IsWindowEnabled
EndDialog
GetWindowTextLengthA
GetWindowTextA
SetScrollPos
GetWindow
SetFocus
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuA
GetMenuState
GetWindowDC
SetRect
RedrawWindow
GetSysColorBrush
IsIconic
GetSubMenu
LoadMenuA
LoadIconA
DrawIcon
GetCursorPos
AppendMenuA
IsWindow
SystemParametersInfoA
CheckMenuItem
SetForegroundWindow
GetWindowPlacement
FindWindowA
EndPaint
DestroyWindow
GetMessageA
BeginPaint
TranslateMessage
UnregisterClassA
CreateWindowExA
DefWindowProcA
ShowWindow
DispatchMessageA
UpdateWindow
FillRect
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableA
CharNextA
MessageBoxA
GetSystemMetrics
InflateRect
GetSystemMenu
ValidateRect
SetWindowContextHelpId
EnableMenuItem
SetCapture
GetWindowInfo
ReleaseCapture
DrawTextA
GetDC
ReleaseDC
GetNextDlgTabItem
GetKeyState
SendMessageA
SetWindowLongA
GetWindowLongA
SetWindowRgn
GetWindowRect
PostMessageA
LoadImageA
SetCursor
SetTimer
ScreenToClient
KillTimer
LoadBitmapA
GetParent
GetClientRect
PtInRect
InvalidateRect
GetSysColor
LoadCursorA
CopyRect
GetMessagePos
CharUpperA
EnableWindow
gdi32
ScaleWindowExtEx
ExtSelectClipRgn
CreatePen
SetWindowExtEx
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
CreateRectRgnIndirect
GetObjectA
GetClipBox
SetMapMode
GetDIBits
CreateFontIndirectA
SetPixelV
GetDeviceCaps
GetTextExtentPoint32A
SetTextColor
DeleteDC
CreateFontA
SetBkColor
CreateBitmap
SetBkMode
DeleteObject
SelectObject
SaveDC
RestoreDC
CreateSolidBrush
BitBlt
CombineRgn
CreateCompatibleBitmap
CreateRectRgn
GetPixel
GetStockObject
CreateCompatibleDC
RoundRect
msimg32
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
GetTokenInformation
OpenProcessToken
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegEnumValueA
RegDeleteValueA
shell32
SHGetPathFromIDListA
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetMalloc
SHBrowseForFolderA
Shell_NotifyIconA
comctl32
ImageList_Create
_TrackMouseEvent
InitCommonControlsEx
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
oledlg
ord8
ole32
CoTaskMemAlloc
CoInitialize
CoUninitialize
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
CoTaskMemFree
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocString
OleCreateFontIndirect
SafeArrayDestroy
VariantCopy
VariantChangeType
SysAllocStringByteLen
SysStringLen
SysAllocStringLen
VariantInit
VariantClear
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
ws2_32
WSAGetLastError
WSAConnect
WSAEnumNetworkEvents
WSAEventSelect
WSAGetOverlappedResult
WSASend
WSACreateEvent
closesocket
WSAResetEvent
WSASocketA
WSACleanup
WSARecv
getaddrinfo
freeaddrinfo
WSASetEvent
WSACloseEvent
WSAStartup
Sections
.text Size: 972KB - Virtual size: 971KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12.4MB - Virtual size: 12.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ