D:\bld\R71_80\drivers\ui\color\bin\URelease\NvColor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
458d97376b8c0ecc3ed4bfc591cc9284_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
458d97376b8c0ecc3ed4bfc591cc9284_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
458d97376b8c0ecc3ed4bfc591cc9284_JaffaCakes118
-
Size
144KB
-
MD5
458d97376b8c0ecc3ed4bfc591cc9284
-
SHA1
46f5f175d81154e56bc172f7b8379a086e1c8de4
-
SHA256
1950f634a59aedb29940cd2964c09c1ca1fd6e194301fd9963c69501bb883d6c
-
SHA512
bef3848529b160f49297fac7ed94f02f542a6057a59dce67ba500c782e7938219b9c4d9f7cbe1e989d29ee821a203f47b7c34f2ab6e94b8e1109f0614b30195c
-
SSDEEP
3072:5Ds8ll/rL2NHvR8GmVEGZa6KQgiG53B6Xt+dlaCm1:59LyPRGfI6KHiGtP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 458d97376b8c0ecc3ed4bfc591cc9284_JaffaCakes118
Files
-
458d97376b8c0ecc3ed4bfc591cc9284_JaffaCakes118.exe windows:4 windows x86 arch:x86
9a59a906e8ef1a602c51f2f6c28df412
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
CreateWindowExW
SendMessageW
wsprintfW
SetWindowsHookExW
SetDlgItemTextW
LoadMenuW
LoadIconW
LoadImageW
LoadStringW
CallNextHookEx
GetWindow
UnhookWindowsHookEx
RegisterClassExW
GetSystemMetrics
SetLayeredWindowAttributes
SetTimer
FillRect
FrameRect
GetWindowRect
BeginPaint
SetFocus
EndPaint
DrawTextW
SetWindowPos
SetWindowTextW
MoveWindow
EnableWindow
MessageBoxW
RegisterClassW
ShowWindow
SetActiveWindow
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
LoadBitmapW
SendInput
PostQuitMessage
DefWindowProcW
ReleaseCapture
SetCapture
PtInRect
SetCursor
LoadCursorW
PostMessageW
GetParent
InvalidateRect
SystemParametersInfoW
GetClientRect
ReleaseDC
GetDC
comctl32
InitCommonControlsEx
shell32
CommandLineToArgvW
mscms
DisassociateColorProfileFromDeviceW
AssociateColorProfileWithDeviceW
setupapi
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
SetupDiDestroyDeviceInfoList
gdi32
GetObjectW
EnumFontsW
GetTextExtentPoint32W
TextOutW
CreateBitmap
CreateCompatibleDC
CreateCompatibleBitmap
SetPixel
CreatePatternBrush
BitBlt
CreateDCW
DeleteDC
SelectObject
SetBkColor
SetBkMode
GetStockObject
SetTextColor
DeleteObject
GetDeviceCaps
CreateFontIndirectW
GetICMProfileW
CreateSolidBrush
ExtEscape
msimg32
GradientFill
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
kernel32
CreateFileW
VirtualQuery
InterlockedExchange
RtlUnwind
FlushFileBuffers
SetStdHandle
IsBadWritePtr
VirtualAlloc
FatalAppExitA
MultiByteToWideChar
SetFilePointer
VirtualFree
HeapCreate
HeapDestroy
TlsGetValue
TlsSetValue
InitializeCriticalSection
CompareStringA
SetLastError
TlsAlloc
DeleteCriticalSection
GetFileType
LoadLibraryA
GetACP
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
HeapSize
GetOEMCP
GetCPInfo
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
SetConsoleCtrlHandler
SetEndOfFile
ReadFile
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
VirtualProtect
GetTimeZoneInformation
TlsFree
GetLocaleInfoW
GetCurrentProcess
TerminateProcess
CompareStringW
SetEnvironmentVariableA
GetCurrentThread
LoadLibraryW
GetProcAddress
lstrlenA
lstrcpyA
lstrlenW
lstrcpyW
GlobalFree
lstrcmpW
GetCommandLineW
lstrcatW
MulDiv
FindResourceW
LoadResource
SizeofResource
GetModuleHandleW
GetCurrentThreadId
GetWindowsDirectoryW
FreeLibrary
GetUserDefaultLangID
GetSystemInfo
GetVersionExW
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
GetLastError
CloseHandle
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
HeapAlloc
ExitProcess
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE