c:\PerforceDepot\Garuda1930\Work\Groups\InstEng9XSustain_Main\LocalKit\Tools\Win\Installer\AdobeSelfExtractor\Release\AdobeSelfExtractor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
34a68bbeb849a3e7fba9031ccc3dc435_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
34a68bbeb849a3e7fba9031ccc3dc435_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34a68bbeb849a3e7fba9031ccc3dc435_JaffaCakes118
-
Size
336KB
-
MD5
34a68bbeb849a3e7fba9031ccc3dc435
-
SHA1
3fb297b9c6edcddf203bc3c09aa8950d2f3abfd2
-
SHA256
347920cec5541b8b21a7b50e72b43c99eebf86d8cb2df6fcd03dbf6a0cb9f219
-
SHA512
7ce338189abed13c3779c3c727ab9a792b8513534c26fed82ce1e83e885f91d674463f93c728ce16af7b11f817c983239413f18b1c9a9ccc2fa6ecc9510338f5
-
SSDEEP
6144:WLM0QT3IgsBN0BLgXMrtNboeQglOEm2oiHEIiatPCg2LLWv:EgsBN0BIMr3POR9IPP6K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34a68bbeb849a3e7fba9031ccc3dc435_JaffaCakes118
Files
-
34a68bbeb849a3e7fba9031ccc3dc435_JaffaCakes118.exe windows:5 windows x86 arch:x86
f1a0235868f8c73213b1712f5640c28e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msi
ord70
kernel32
DeleteCriticalSection
TlsFree
WritePrivateProfileStringW
GetCurrentDirectoryW
GlobalFlags
lstrlenA
SetErrorMode
GetFileSizeEx
GetFileTime
GetStartupInfoW
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
ExitProcess
SetEnvironmentVariableW
SetCurrentDirectoryW
RtlUnwind
RaiseException
HeapReAlloc
ExitThread
SetStdHandle
GetFileType
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
LocalReAlloc
HeapCreate
QueryPerformanceCounter
GetTickCount
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
GetCurrentDirectoryA
GetDriveTypeA
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GetModuleHandleA
InterlockedDecrement
FreeResource
GetCurrentProcessId
GlobalAddAtomW
SuspendThread
ResumeThread
SetThreadPriority
GetFullPathNameW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
GetModuleFileNameW
lstrcmpA
GetLocaleInfoW
LoadLibraryW
CompareStringA
InterlockedExchange
lstrcmpW
FreeLibrary
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
GetModuleHandleW
GetProcAddress
lstrlenW
GetVolumeInformationW
WideCharToMultiByte
CreateThread
SetFileTime
MoveFileW
VirtualAlloc
VirtualFree
RemoveDirectoryW
SetFileAttributesW
GetExitCodeProcess
CreateProcessW
CreateDirectoryW
GetPrivateProfileStringW
SetEvent
Sleep
WaitForSingleObject
ResetEvent
CreateEventW
GlobalMemoryStatusEx
GetEnvironmentVariableW
GetVersionExW
GetTempPathW
DeleteFileW
GetCommandLineW
LocalFree
FormatMessageW
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
GetFileAttributesW
CloseHandle
GetLastError
CreateFileW
ReadFile
WriteFile
SetFilePointer
GetFileSize
CreateFileA
GetStartupInfoA
user32
LoadCursorW
GetSysColorBrush
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
CopyRect
PtInRect
GetMenu
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
DrawTextExW
DrawTextW
TabbedTextOutW
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetLastActivePopup
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
CharUpperW
GetWindowTextW
GetFocus
GetParent
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
SetWindowLongW
DestroyMenu
CallWindowProcW
UnregisterClassW
GetDlgCtrlID
GetWindowLongW
IsDialogMessageW
SendDlgItemMessageW
GetWindow
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
FindWindowW
SetWindowTextW
GetDlgItem
EnableWindow
IsWindow
DrawIcon
GetClientRect
IsIconic
SendMessageW
LoadIconW
PostMessageW
GetSystemMetrics
MessageBoxW
GrayStringW
gdi32
DeleteDC
GetStockObject
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
GetDeviceCaps
CreateFontW
GetObjectW
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
RectVisible
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegFlushKey
RegCreateKeyW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
shell32
SHGetPathFromIDListW
SHGetMalloc
SHGetFolderPathW
ord165
SHBrowseForFolderW
shlwapi
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathFindExtensionW
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29.6MB - Virtual size: 29.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ