d:\LimeWireSrc\private\internal\GnucDNA\StubInstaller\Release\StubInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
39457fe32dd76e9d19be3ae7c0f3eb73_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
39457fe32dd76e9d19be3ae7c0f3eb73_JaffaCakes118
-
Size
964KB
-
MD5
39457fe32dd76e9d19be3ae7c0f3eb73
-
SHA1
468e18458133f3de36ea00c0eb695a9b83bd2862
-
SHA256
8cca4a57ad0c4270d97bba09f5baa9787ad098ba398ed509b71637ef1265a444
-
SHA512
73e1a6bbca1b122d1132d9a58370af600c082725a9a8d7128a1bb1bf135feab7cb50082243c60f3c7f9ee1c2dd15db9ad41675673ff1a541079853677152b661
-
SSDEEP
24576:abuGWFnHTqPeNbIX2aPhkjAHlrT95BQxx9fdKG5lCqTnFkIsw48NkaWIVaqv:8hWFnHTqPeNbIX2aPZHlrT95BUKGiqTl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39457fe32dd76e9d19be3ae7c0f3eb73_JaffaCakes118
Files
-
39457fe32dd76e9d19be3ae7c0f3eb73_JaffaCakes118.exe windows:4 windows x86 arch:x86
9653ff80ab8042fa5f2960f5536edacb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitThread
CreateThread
GetSystemTimeAsFileTime
TerminateProcess
GetTimeFormatA
GetDateFormatA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
SetErrorMode
IsBadWritePtr
GetCurrentProcessId
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
GetExitCodeProcess
CreateProcessA
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
GlobalFlags
GetCurrentDirectoryA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
InterlockedIncrement
RaiseException
GetFileTime
GetFileAttributesA
LocalAlloc
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
ReleaseMutex
CreateMutexA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
InterlockedDecrement
FreeResource
CreateEventA
SuspendThread
SetThreadPriority
CloseHandle
GlobalAddAtomA
GetCurrentThread
FreeLibrary
GlobalDeleteAtom
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
SetLastError
MulDiv
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
GetCurrentThreadId
GetModuleHandleA
ResumeThread
SetThreadAffinityMask
WaitForSingleObject
FindFirstChangeNotificationA
ResetEvent
FindCloseChangeNotification
WritePrivateProfileStringA
CopyFileA
DeleteFileA
GetModuleFileNameA
GlobalMemoryStatus
QueryPerformanceFrequency
QueryPerformanceCounter
SetEvent
MoveFileA
CreateDirectoryA
GetTickCount
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalFree
LoadLibraryA
GetProcAddress
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
VirtualFree
InterlockedExchange
user32
RegisterClipboardFormatA
PostThreadMessageA
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextA
SetFocus
ShowWindow
MoveWindow
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
UnhookWindowsHookEx
WaitMessage
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetParent
GetLastActivePopup
IsWindowEnabled
SetCursor
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DestroyMenu
MessageBeep
UnregisterClassA
GetNextDlgGroupItem
DestroyWindow
RegisterClassExA
CreateWindowExA
SetWindowLongA
GetWindowLongA
DefWindowProcA
MsgWaitForMultipleObjects
MessageBoxA
EmptyClipboard
SetClipboardData
CloseClipboard
GetSystemMetrics
LoadIconA
EnableWindow
OpenClipboard
KillTimer
SetTimer
GetClientRect
IsIconic
PostMessageA
SendMessageA
DrawIcon
CharUpperA
PtInRect
gdi32
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
TextOutA
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
GetDeviceCaps
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateRectRgnIndirect
CreateBitmap
ExtTextOutA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
UrlUnescapeA
oledlg
ord8
ole32
OleUninitialize
CoFreeUnusedLibraries
CoCreateGuid
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
oleaut32
VariantCopy
SafeArrayDestroy
OleCreateFontIndirect
SysAllocStringByteLen
SysStringLen
VariantInit
VariantChangeType
SysAllocStringLen
SysFreeString
SysAllocString
VariantClear
SystemTimeToVariantTime
ws2_32
WSAStartup
WSACleanup
select
sendto
recvfrom
ntohs
socket
WSAGetLastError
inet_ntoa
gethostbyname
inet_addr
gethostname
ntohl
htonl
bind
WSACancelAsyncRequest
closesocket
recv
send
connect
getpeername
getsockname
shutdown
listen
ioctlsocket
htons
WSASetLastError
WSAAsyncGetHostByName
WSAAsyncSelect
accept
wininet
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetSetOptionExA
InternetQueryOptionA
InternetCrackUrlA
InternetCanonicalizeUrlA
Sections
.text Size: 512KB - Virtual size: 511KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
djydztg Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cohjbwk Size: 80KB - Virtual size: 80KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE