d:\Progs\guliverkli\src\apps\vsrip\Release\VSRip.pdb
Static task
static1
Behavioral task
behavioral1
Sample
29e6f292f46c6864ccf9dd90dac688d1_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
29e6f292f46c6864ccf9dd90dac688d1_JaffaCakes118
-
Size
508KB
-
MD5
29e6f292f46c6864ccf9dd90dac688d1
-
SHA1
f404d347e7be90d3f2e8282730a0334ca7903c0a
-
SHA256
dfc32590f77188320be35d4168555cb2691f2b2c3675eddfb8cc6292962a60ce
-
SHA512
00c8548fa5ab39985732800a62ca011367ae00c505cb827db669507d79de6ce5fb842d8a8b823e7add728c597797fb00268678bfc8cbe0e2cd38dcf18daf81ba
-
SSDEEP
12288:PStEljhP05c7jCPmMTe7HYTV4bTh1g95Iy8EPl5SW3yQPTZ6:KTqAmMTerQV4Ph1a5TD5S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29e6f292f46c6864ccf9dd90dac688d1_JaffaCakes118
Files
-
29e6f292f46c6864ccf9dd90dac688d1_JaffaCakes118.exe windows:4 windows x86 arch:x86
2cbe69fd5a8ba604832e65463d61ceb0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
CreateThread
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStdHandle
UnhandledExceptionFilter
VirtualProtect
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
HeapFree
HeapAlloc
SetErrorMode
GetOEMCP
GetCPInfo
GlobalFlags
WritePrivateProfileStringA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
FreeResource
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
GetModuleHandleA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
SetLastError
GlobalFree
ResetEvent
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
IsDBCSLeadByteEx
GetTempPathA
CreateEventA
SetEvent
GetFullPathNameA
GetProcAddress
CreateFileA
DeviceIoControl
MulDiv
SetThreadPriority
WaitForSingleObject
CloseHandle
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InterlockedDecrement
FreeLibrary
InterlockedIncrement
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
FreeEnvironmentStringsA
InterlockedExchange
user32
LoadCursorA
GetSysColorBrush
wsprintfA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
SetForegroundWindow
UpdateWindow
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
GetWindowPlacement
GetWindowRect
PtInRect
GetWindowTextLengthA
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
MoveWindow
GetDlgCtrlID
SetWindowTextA
SendDlgItemMessageA
SystemParametersInfoA
DestroyMenu
GetSysColor
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
PostQuitMessage
GetMenuState
GetMenuItemID
SetWindowLongA
GetMenuItemCount
GetSubMenu
CharLowerBuffA
SetRectEmpty
MessageBoxA
GetDC
ReleaseDC
EqualRect
CopyRect
IntersectRect
OffsetRect
IsRectEmpty
MessageBeep
GetParent
PostMessageA
GetSystemMetrics
LoadIconA
EnableWindow
InvalidateRect
MapWindowPoints
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
RemoveMenu
DrawIcon
GetWindow
UnregisterClassA
CharUpperA
IsDialogMessageA
gdi32
RectVisible
PtVisible
GetObjectA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
CreateFontA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
AddFontResourceA
GetDeviceCaps
TranslateCharsetInfo
TextOutA
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
ole32
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
oleaut32
SysFreeString
SysStringLen
VarBstrCmp
VariantInit
VariantClear
SysAllocString
SysAllocStringByteLen
VariantChangeType
Sections
.text Size: 300KB - Virtual size: 297KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE