c:\autobuild\devlp13\mike\registrybot\trunk_ns\release\RegistryBot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2e46cf94d5e21aeb42b9c962e96126c4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e46cf94d5e21aeb42b9c962e96126c4_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e46cf94d5e21aeb42b9c962e96126c4_JaffaCakes118
-
Size
2.8MB
-
MD5
2e46cf94d5e21aeb42b9c962e96126c4
-
SHA1
0a43ba907d082c208e45973a1164087ff8f96ee9
-
SHA256
f579f63fe70cc88e93ce08d6e226107e75e112ed7ec915fc962cb9df83eed49c
-
SHA512
d440bd1a7546d3b493b8aa11e4cab383c172950d829dd653f9ac5d0887115eada56f0785fd61c99f727c15dde3d596d4f6009683a4599d97fdbd54f2c42d2538
-
SSDEEP
49152:DZpcBKkZNUi7Z8ymTcb+myy3Bmv88RyrDpQykK5:FpcUkZN37CyVBc83pQhK5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e46cf94d5e21aeb42b9c962e96126c4_JaffaCakes118
Files
-
2e46cf94d5e21aeb42b9c962e96126c4_JaffaCakes118.exe windows:4 windows x86 arch:x86
eff993fcf7d296fa51c67227e2850b6c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcmpA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GlobalDeleteAtom
GetModuleFileNameW
InterlockedDecrement
GetCurrentProcessId
SuspendThread
GlobalAddAtomA
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetThreadLocale
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
RaiseException
GlobalFlags
GlobalReAlloc
GlobalHandle
LocalReAlloc
InterlockedIncrement
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
VirtualProtect
VirtualQuery
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
ExitThread
CreateThread
SetEnvironmentVariableA
SetStdHandle
GetFileType
ExitProcess
RtlUnwind
HeapSize
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetDriveTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileW
QueryDosDeviceA
ReadFile
WriteFile
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
ConnectNamedPipe
VirtualFree
VirtualAlloc
DisconnectNamedPipe
FlushFileBuffers
GetTempPathA
WritePrivateProfileStringA
HeapFree
GetProcessHeap
HeapAlloc
SearchPathA
GetSystemTime
CreateProcessA
ExpandEnvironmentStringsA
MoveFileA
CopyFileA
SetFileAttributesA
GetFileAttributesA
CreateNamedPipeA
TerminateProcess
GetSystemInfo
FormatMessageA
GetFileTime
LocalFree
LocalAlloc
GetCurrentThread
InitializeCriticalSection
GetStdHandle
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetVersionExA
GlobalUnlock
GlobalLock
ResetEvent
SetEvent
FreeResource
GlobalAlloc
ResumeThread
GlobalFree
lstrcatA
lstrcpyA
MulDiv
GetWindowsDirectoryA
GetModuleFileNameA
WinExec
GetCurrentDirectoryA
SetCurrentDirectoryA
SetThreadPriority
CreateEventA
FreeLibrary
WaitForSingleObject
SetLastError
Sleep
GetModuleHandleA
CreateDirectoryA
CreateFileA
GetCurrentProcess
CloseHandle
GetLocalTime
FindClose
FindNextFileA
DeleteFileA
LoadLibraryA
FileTimeToLocalFileTime
GetProcAddress
FileTimeToSystemTime
FindFirstFileA
lstrcpynA
CompareStringW
GetEnvironmentVariableA
GetVersion
CompareStringA
InterlockedExchange
lstrlenA
MultiByteToWideChar
GetLastError
SizeofResource
LoadResource
FindResourceA
WideCharToMultiByte
HeapReAlloc
LockResource
user32
DestroyMenu
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
CharNextA
MapDialogRect
SetWindowContextHelpId
RegisterClipboardFormatA
GetNextDlgGroupItem
PostThreadMessageA
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetScrollInfo
CallWindowProcA
OffsetRect
GetWindowPlacement
SetWindowsHookExA
CallNextHookEx
GetMessageA
IsWindowVisible
GetKeyState
ValidateRect
ScreenToClient
GrayStringA
DrawTextExA
TabbedTextOutA
GetWindowThreadProcessId
GetLastActivePopup
SetFocus
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
UnhookWindowsHookEx
PostQuitMessage
TrackMouseEvent
HideCaret
SetActiveWindow
GetActiveWindow
IsWindowEnabled
GetDesktopWindow
GetCaretPos
CopyIcon
InflateRect
IsWindow
SetCapture
MessageBeep
DestroyIcon
PtInRect
GetFocus
BeginPaint
SetPropA
GetDlgCtrlID
DefWindowProcA
GetPropA
UnregisterClassA
RegisterClassExA
GetParent
LoadBitmapA
SendMessageA
SetWindowLongA
FillRect
GetWindowTextA
GetWindowTextLengthA
SendMessageCallbackA
CreateWindowExA
EndPaint
ClientToScreen
WindowFromPoint
GetCapture
DestroyCursor
GetDC
CharUpperA
KillTimer
EnableWindow
SetTimer
SetForegroundWindow
LoadMenuA
GetSubMenu
GetWindowLongA
GetCursorPos
IsIconic
TrackPopupMenu
PostMessageA
GetSystemMetrics
GetClientRect
DrawIcon
LoadIconA
ExitWindowsEx
GetSysColor
MessageBoxA
FindWindowA
InvalidateRect
GetWindowRect
PeekMessageA
TranslateMessage
DispatchMessageA
RedrawWindow
LoadCursorA
SetRect
GetSysColorBrush
CopyRect
DrawTextA
SetWindowRgn
SetCursor
SystemParametersInfoA
SetWindowPos
GetWindowDC
DrawFocusRect
SetClassLongA
DrawEdge
ReleaseCapture
ReleaseDC
IntersectRect
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ArcTo
ExtSelectClipRgn
Escape
CreateRectRgnIndirect
GetMapMode
GetRgnBox
GetWindowExtEx
RectVisible
TextOutA
CreatePen
GetStockObject
GetViewportExtEx
MoveToEx
LineTo
GetClipBox
SetMapMode
RestoreDC
SaveDC
CreateBitmap
CreatePatternBrush
GetTextColor
GetTextExtentPoint32A
GetBkColor
GetCurrentObject
SetTextColor
SetBkColor
SetBkMode
SelectObject
ExtCreateRegion
GetPixel
SelectClipRgn
DeleteDC
StretchBlt
CreateCompatibleBitmap
ExtTextOutA
GetTextMetricsA
DeleteObject
CombineRgn
CreateRectRgn
BitBlt
CreateCompatibleDC
CreateSolidBrush
GetDeviceCaps
CreateFontIndirectA
GetObjectA
PtVisible
msimg32
GradientFill
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
_TrackMouseEvent
shlwapi
PathFileExistsA
PathIsDirectoryA
PathIsUNCA
PathStripToRootA
UrlUnescapeA
PathFindFileNameA
PathFindExtensionA
SHDeleteKeyA
oledlg
ord8
ole32
CoUninitialize
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SafeArrayGetElemsize
OleCreateFontIndirect
OleLoadPicture
SysFreeString
SysAllocString
VariantClear
SysStringLen
VarBstrCmp
SysAllocStringLen
SysAllocStringByteLen
VariantChangeType
VariantInit
VariantCopy
DispCallFunc
LoadRegTypeLi
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Exports
Exports
PIEImportTest
Sections
.text Size: 856KB - Virtual size: 854KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 184KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ