e:\sample\install\Release\install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
297b6424010ba67369fd355116a0db29_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
297b6424010ba67369fd355116a0db29_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
297b6424010ba67369fd355116a0db29_JaffaCakes118
-
Size
152KB
-
MD5
297b6424010ba67369fd355116a0db29
-
SHA1
ccf0f6cd31b4d3c85130d9e9244e4b5906248dd3
-
SHA256
5984683668ed6a7389b493422024ddd0e6fffc6226516e20f7c3011506baefcb
-
SHA512
d65ad0cacbd5563d82d45173bfbb7c37fbebd671c7436cc8d9bf893248e41034dc795bd35a15655df36d2db700cd4e4533f877e7f368c02bd752c4f3b2f3b288
-
SSDEEP
3072:RgIj1amKSIMyjIFK5sUHgmbTzHc9n3LLP9ljsM:hKSIjIcyrmPzHY3LzQM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 297b6424010ba67369fd355116a0db29_JaffaCakes118
Files
-
297b6424010ba67369fd355116a0db29_JaffaCakes118.exe windows:4 windows x86 arch:x86
68425aab96b9778075a85cad55d07c95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
LocalFree
lstrcpynA
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
SetLastError
CreateEventA
WaitForSingleObject
SetThreadPriority
ResumeThread
GetCurrentThreadId
SetEvent
SuspendThread
RaiseException
InterlockedDecrement
InterlockedIncrement
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
lstrcmpA
GetProcAddress
GetModuleHandleA
lstrcmpW
lstrcatA
FreeLibrary
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GlobalFlags
lstrcpyA
GetCPInfo
GetOEMCP
FlushFileBuffers
GetCurrentProcess
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitThread
HeapSize
TerminateProcess
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
lstrcmpiA
GetVersion
GetLastError
CreateThread
DeleteFileA
SetFilePointer
WriteFile
CreateFileA
GetFileSize
ReadFile
CloseHandle
GetTempPathA
FindResourceA
LoadResource
LockResource
SizeofResource
Sleep
GetExitCodeThread
TerminateThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetModuleFileNameA
InterlockedExchange
user32
GetDlgItem
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassInfoExA
GetClassLongA
GetCapture
WinHelpA
RegisterWindowMessageA
SetWindowTextA
DestroyMenu
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
GetDlgCtrlID
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetTopWindow
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowTextA
MessageBoxA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
UnhookWindowsHookEx
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CharLowerA
PostMessageA
UpdateWindow
ShowWindow
CreateWindowExA
SetTimer
SendMessageA
KillTimer
DefWindowProcA
PostQuitMessage
EndPaint
BeginPaint
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenuItemBitmaps
EnableWindow
advapi32
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
shell32
ShellExecuteA
comctl32
ord17
wininet
InternetSetOptionA
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
InternetOpenUrlA
ws2_32
WSACleanup
WSAStartup
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
CreateBitmap
GetStockObject
ScaleViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
SaveDC
SetBkColor
DeleteDC
SetTextColor
SetMapMode
GetClipBox
DeleteObject
RestoreDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
SetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
GetDeviceCaps
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ