d:\build1\TUU2012-Update-2\Setup\TUStub\Release\TUStub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3933333b048df02cf92e98ef7f446fdd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3933333b048df02cf92e98ef7f446fdd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3933333b048df02cf92e98ef7f446fdd_JaffaCakes118
-
Size
1012KB
-
MD5
3933333b048df02cf92e98ef7f446fdd
-
SHA1
9feb83374a6083f2d236910f4731334fe9a3e8ed
-
SHA256
419693045b1a7d56fa3cd1226bbac4f5d5e75faa77e425f4f61307e8559d3b5c
-
SHA512
338c201afaf737e719e1b3d645c9a2aae0d22c3182881f263a63e7f130a60c0b7bcd82e01cf7829cc7469638f104e2c48917b37c80eeeb2b57a155b43ab5f764
-
SSDEEP
12288:SSG+dN+SkGZ22oWzqPsZi1Z0Hajjpa/SksDXAuIa/f6WLmrJjtcNrjULg3svtQ:SSG+v+SDU1s7Zi16YumMXjGdH3svtQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3933333b048df02cf92e98ef7f446fdd_JaffaCakes118
Files
-
3933333b048df02cf92e98ef7f446fdd_JaffaCakes118.exe windows:5 windows x86 arch:x86
019c98fc882bc6356db649ebc0f0201a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msi
ord169
ord16
ord113
ord141
ord92
ord88
ord70
ord8
ord118
ord160
ord159
ord32
comctl32
ImageList_Create
ord17
InitCommonControlsEx
ImageList_Add
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
kernel32
GetNativeSystemInfo
GetSystemDefaultLCID
GetUserDefaultLCID
GetPrivateProfileStringW
FindResourceExW
GetLastError
LoadResource
SizeofResource
LockResource
WriteFile
GetCurrentProcess
CreateDirectoryW
LocalFree
GetTickCount
Sleep
GetExitCodeProcess
AttachConsole
FreeConsole
SetFileAttributesW
lstrlenW
lstrcpyW
lstrcatW
SystemTimeToFileTime
OpenProcess
lstrcmpiW
ExpandEnvironmentStringsW
GetVersion
GetWindowsDirectoryW
SetCurrentDirectoryW
GetCommandLineW
CreateMutexW
MultiByteToWideChar
FormatMessageW
GetUserDefaultUILanguage
GetVersionExW
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetFileType
SetHandleCount
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetModuleFileNameA
GetStdHandle
HeapCreate
VirtualAlloc
VirtualFree
IsValidCodePage
GetOEMCP
GetACP
HeapSize
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
CompareStringW
GetStringTypeW
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
HeapReAlloc
ExitProcess
HeapFree
HeapAlloc
GetLocaleInfoW
GetModuleHandleA
GetModuleHandleW
WideCharToMultiByte
UnmapViewOfFile
CloseHandle
VirtualQuery
MapViewOfFile
CreateFileMappingW
CreateFileW
GetSystemTime
FileTimeToSystemTime
GetFileAttributesExW
GetTempFileNameW
GetTempPathW
GetProcAddress
LoadLibraryW
FreeLibrary
DeleteFileW
GetModuleFileNameW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
SetFilePointer
GetConsoleCP
GetConsoleMode
CreateFileA
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
GetProcessHeap
ReadFile
EnumResourceNamesW
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
InterlockedCompareExchange
InterlockedDecrement
InterlockedIncrement
user32
LoadCursorW
SendInput
MessageBoxW
LoadStringW
GetSystemMetrics
DefWindowProcW
LoadIconW
PostMessageW
KillTimer
SetTimer
EnableMenuItem
GetSystemMenu
LoadImageW
DialogBoxParamW
EndDialog
IsDlgButtonChecked
SetFocus
UpdateWindow
InvalidateRect
GetDC
SetParent
ShowWindow
AttachThreadInput
BringWindowToTop
SetForegroundWindow
GetForegroundWindow
DrawTextW
GetWindowTextW
ScreenToClient
GetWindowRect
GetClientRect
GetDlgItem
SetWindowTextW
LoadBitmapW
SendMessageW
ExitWindowsEx
GetWindowThreadProcessId
IsWindow
FindWindowW
wsprintfW
DestroyWindow
CreateWindowExW
RegisterClassExW
gdi32
CreateFontW
GetDeviceCaps
SetBkMode
Rectangle
SelectObject
CreatePen
CreateSolidBrush
SetTextColor
GetStockObject
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
QueryServiceStatusEx
ControlService
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
EqualSid
OpenProcessToken
DuplicateTokenEx
IsValidSid
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
GetTokenInformation
FreeSid
AllocateAndInitializeSid
RegEnumKeyExW
RegDeleteKeyW
RegQueryValueExW
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
shell32
ShellExecuteExW
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
ole32
StringFromGUID2
CoCreateGuid
CoUninitialize
CoInitialize
CoCreateInstance
IIDFromString
oleaut32
SysFreeString
SysAllocString
VariantInit
Sections
.text Size: 288KB - Virtual size: 288KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31.9MB - Virtual size: 31.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ