D:\Flipopia v1.2\Release\Flipopia.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3db57c558d84760b27603db0181bbf11_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3db57c558d84760b27603db0181bbf11_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3db57c558d84760b27603db0181bbf11_JaffaCakes118
-
Size
2.0MB
-
MD5
3db57c558d84760b27603db0181bbf11
-
SHA1
a25129d7c63d422ee4d15852d284ceb3d727483f
-
SHA256
cad5238f21205ea3eaa9723941430467bb9cf0966509f3cefe1d82f9678f2fdc
-
SHA512
67c50de68f1e1054309d32e8cd711b61804e524daafd3b76f11a636b8bc0737a2ffc20a99c0bb7a9f079b8fe6c1f58c8a76b0ee0feb7e0e450dc4f5b1888158f
-
SSDEEP
49152:mD4uECThT+MJlf2fztoKgTOra52P2FWJB/FesTH+orlwFYIwJXaYRGvVPYDbhr83:u8ulf2J3gKa5rFWJB/FesTH+orlwe3R+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3db57c558d84760b27603db0181bbf11_JaffaCakes118
Files
-
3db57c558d84760b27603db0181bbf11_JaffaCakes118.exe windows:5 windows x86 arch:x86
f71cd678685ce7b4fe5668733e076c63
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
ConnectNamedPipe
CreateNamedPipeA
GetModuleHandleA
GetCurrentThreadId
lstrcmpiA
GetCommandLineA
GetVolumeInformationA
ExitProcess
CreateMutexA
GetCurrentProcessId
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
GetTempPathA
CopyFileA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FileTimeToLocalFileTime
FileTimeToSystemTime
GetComputerNameA
FreeResource
FindResourceA
Sleep
ReadFile
lstrcpyA
lstrlenA
GetFileAttributesA
CreateDirectoryA
FindNextFileA
FindClose
DeleteFileA
FindFirstFileA
LocalFree
FormatMessageA
SetLastError
OpenProcess
TerminateProcess
WaitForSingleObject
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
GetShortPathNameA
GetModuleFileNameA
GetCurrentProcess
SetPriorityClass
DeviceIoControl
GetLastError
CreateFileA
GetTimeZoneInformation
GetSystemTime
CloseHandle
WriteFile
SetFilePointer
CreateProcessA
GetTempFileNameA
MultiByteToWideChar
MulDiv
lstrlenW
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GlobalFree
DeactivateActCtx
CreateActCtxW
ReleaseActCtx
ActivateActCtx
GetModuleFileNameW
InterlockedDecrement
SystemTimeToFileTime
CreateSemaphoreA
ReleaseSemaphore
CreateEventA
MoveFileA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetFullPathNameA
SetThreadPriority
ResumeThread
SetEvent
SuspendThread
GetFileAttributesExA
SetFileAttributesA
GetFileSizeEx
GlobalGetAtomNameA
GetModuleHandleW
InterlockedExchange
CompareStringA
GetLocaleInfoA
GetSystemDefaultUILanguage
ConvertDefaultLocale
GetUserDefaultUILanguage
GetCurrentThread
GlobalDeleteAtom
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
GlobalAddAtomA
InterlockedIncrement
lstrcmpW
LoadLibraryW
GlobalFindAtomA
LocalAlloc
GetUserDefaultLCID
TlsGetValue
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
SetErrorMode
GetCurrentDirectoryA
GetACP
GetCPInfo
GetOEMCP
GetWindowsDirectoryA
GetNumberFormatA
GetTickCount
GetProfileIntA
SearchPathA
VirtualProtect
FindResourceExW
HeapFree
HeapAlloc
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
HeapReAlloc
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapSetInformation
GetStartupInfoW
RtlUnwind
RaiseException
ExitThread
CreateThread
HeapQueryInformation
HeapSize
SetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
GetConsoleCP
GetConsoleMode
GetStdHandle
IsValidCodePage
IsProcessorFeaturePresent
SetHandleCount
GetLocaleInfoW
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetDriveTypeW
GetStringTypeW
CompareStringW
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
GetCurrentDirectoryW
GetProcessHeap
CreateFileW
SetEnvironmentVariableA
lstrcmpA
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
user32
IsChild
WinHelpA
SendDlgItemMessageA
LoadIconA
LoadIconW
CheckDlgButton
IsDialogMessageA
MoveWindow
ShowWindow
GetSysColorBrush
ReleaseDC
GetDC
LoadCursorA
UnregisterClassA
ClientToScreen
RealChildWindowFromPoint
FillRect
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetWindowDC
BeginPaint
EndPaint
SetCapture
WindowFromPoint
LoadCursorW
ReleaseCapture
WaitMessage
DeleteMenu
InvalidateRect
SetRectEmpty
SystemParametersInfoA
EnumDisplayMonitors
SetLayeredWindowAttributes
IsIconic
DestroyIcon
InflateRect
GetMenuItemInfoA
DestroyMenu
IntersectRect
TranslateAcceleratorA
OffsetRect
CreatePopupMenu
InsertMenuItemA
LoadAcceleratorsA
LoadImageA
LoadMenuA
ReuseDDElParam
UnpackDDElParam
IsRectEmpty
IsZoomed
SetWindowRgn
RedrawWindow
DestroyAcceleratorTable
NotifyWinEvent
GetAsyncKeyState
SetClassLongA
LoadMenuW
GetSystemMenu
MessageBeep
DrawStateA
DrawIconEx
DrawEdge
DrawFrameControl
DrawFocusRect
CopyAcceleratorTableA
ToAsciiEx
MapVirtualKeyA
GetKeyboardLayout
GetKeyboardState
LoadAcceleratorsW
GetWindowRect
SetRect
SetCursorPos
LockWindowUpdate
GetMenuDefaultItem
InvertRect
HideCaret
EnableScrollBar
GetCapture
CopyImage
GetNextDlgGroupItem
UnionRect
DefFrameProcA
DefMDIChildProcA
DrawMenuBar
TranslateMDISysAccel
MonitorFromPoint
UpdateLayeredWindow
IsMenu
CreateMenu
PostThreadMessageA
SetMenuDefaultItem
IsClipboardFormatAvailable
FrameRect
GetUpdateRect
OpenClipboard
SetClipboardData
CloseClipboard
EmptyClipboard
LoadImageW
RegisterClipboardFormatA
CopyIcon
CharUpperBuffA
GetDoubleClickTime
IsCharLowerA
MapVirtualKeyExA
SubtractRect
MapDialogRect
DrawIcon
DestroyCursor
GetWindowRgn
GetMenuStringA
AppendMenuA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
RemoveMenu
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
CopyRect
PtInRect
SetWindowPlacement
GetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
GetLastActivePopup
MessageBoxA
ShowOwnedPopups
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
GetIconInfo
ScrollWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
PostQuitMessage
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
CharUpperA
GetKeyNameTextA
AdjustWindowRectEx
GetSystemMetrics
BringWindowToTop
SetWindowTextA
GetClientRect
EnableWindow
SetParent
SetTimer
KillTimer
GetWindowTextA
GetCursorPos
EnumChildWindows
EnumThreadWindows
WaitForInputIdle
FindWindowA
SetForegroundWindow
GetForegroundWindow
IsWindowVisible
GetWindow
SendMessageTimeoutA
GetParent
GetClassNameA
RegisterWindowMessageA
wsprintfA
PostMessageA
FindWindowExA
GetWindowThreadProcessId
GetWindowTextLengthA
UnhookWindowsHookEx
CreateAcceleratorTableA
GetMenuState
advapi32
RegCloseKey
RegEnumKeyA
RegQueryValueA
RegEnumValueA
SetNamedSecurityInfoA
RegOpenKeyExA
RegOpenKeyA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCreateKeyExA
RegSetValueExA
GetLengthSid
SetTokenInformation
DuplicateTokenEx
OpenProcessToken
AllocateAndInitializeSid
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
SHBrowseForFolderA
SHAppBarMessage
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetDesktopFolder
DragQueryFileA
DragFinish
SHGetFileInfoA
ole32
IsAccelerator
CreateStreamOnHGlobal
DoDragDrop
OleTranslateAccelerator
OleGetClipboard
RegisterDragDrop
CoLockObjectExternal
RevokeDragDrop
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
CoDisconnectObject
CoCreateGuid
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CoTaskMemFree
CoInitialize
CoUninitialize
CoInitializeEx
OleRun
CoCreateInstance
CoGetMalloc
StringFromIID
OleLockRunning
oleaut32
SysFreeString
SysAllocStringLen
SysAllocString
VariantCopy
VariantClear
VariantChangeType
VarBstrFromDate
SysStringLen
LoadTypeLi
GetErrorInfo
VariantInit
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringByteLen
msimg32
TransparentBlt
AlphaBlend
comctl32
ImageList_GetIconSize
shlwapi
PathRemoveExtensionA
PathFileExistsA
PathAppendA
PathIsDirectoryA
SHSetValueA
PathFindExtensionA
PathFindFileNameA
PathRemoveFileSpecA
SHGetValueA
PathStripToRootA
PathIsUNCA
PathRemoveFileSpecW
oleacc
ObjectFromLresult
CreateStdAccessibleObject
AccessibleObjectFromWindow
LresultFromObject
wininet
FindFirstUrlCacheEntryA
FindCloseUrlCache
InternetOpenA
InternetConnectA
InternetGetLastResponseInfoA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetGetCookieA
InternetSetCookieA
InternetGetConnectedState
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
gdiplus
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipDrawImageI
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDrawImageRectI
GdipSetInterpolationMode
GdipCreateFromHDC
GdiplusShutdown
GdiplusStartup
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipGetImagePaletteSize
GdipGetImageGraphicsContext
GdipFree
imm32
ImmGetContext
ImmGetOpenStatus
ImmReleaseContext
winmm
PlaySoundA
gdi32
SetPixelV
GetTextFaceA
DeleteObject
SaveDC
RestoreDC
SetBkMode
SetPolyFillMode
SetROP2
SetMapMode
GetClipBox
ExcludeClipRect
IntersectClipRect
LineTo
MoveToEx
SetTextAlign
GetLayout
SetLayout
SelectClipRgn
CreateRectRgn
StretchBlt
SetDIBColorTable
GetRgnBox
OffsetRgn
GetSystemPaletteEntries
RealizePalette
GetNearestPaletteIndex
GetPaletteEntries
CreatePalette
Polygon
Ellipse
Polyline
CreateEllipticRgn
GetTextColor
GetBkColor
CreatePolygonRgn
CreateRoundRectRgn
CreateDIBSection
DPtoLP
PatBlt
SetPaletteEntries
ExtFloodFill
GetBoundsRect
FrameRgn
FillRgn
PtInRegion
GetViewportOrgEx
GetObjectA
CombineRgn
SetRectRgn
GetTextExtentPoint32A
GetTextCharsetInfo
EnumFontFamiliesA
GetTextMetricsA
CreateRectRgnIndirect
CreateCompatibleBitmap
CreateFontIndirectA
CreateDIBitmap
CreateHatchBrush
CreateSolidBrush
CreatePen
GetObjectType
SelectPalette
GetStockObject
SetBkColor
SetTextColor
CreateBitmap
CreateDCA
CopyMetaFileA
Rectangle
EnumFontFamiliesExA
LPtoDP
SetPixel
GetWindowOrgEx
CreateCompatibleDC
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
GetDeviceCaps
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comdlg32
GetFileTitleA
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 358KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ