d:\Source\ToolsCurrent\release\MicrogamingInstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4b8327595fd8fdd026a8670c538fcc97_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b8327595fd8fdd026a8670c538fcc97_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b8327595fd8fdd026a8670c538fcc97_JaffaCakes118
-
Size
540KB
-
MD5
4b8327595fd8fdd026a8670c538fcc97
-
SHA1
62da36be48c8eef295fb936dd388d766f282add5
-
SHA256
f6e8c73a2f37f34c574401574c4b5e3a22d0105b3292d58e12324dba3aea162e
-
SHA512
7821c45c6adea20d88e00be84171f0f92cefc473c9bec77d7c173bc663aaf8e6af6bbb115bf76e11bc3b0dfdfabb822fb5ab26787af613790c66c838d9f2cbe2
-
SSDEEP
12288:m8KbyYgzl6QzKUdM48wvZ8zuQ3Msy96dMN:mXy9tzKUd58mZ8zl3Msy96dMN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b8327595fd8fdd026a8670c538fcc97_JaffaCakes118
Files
-
4b8327595fd8fdd026a8670c538fcc97_JaffaCakes118.exe windows:5 windows x86 arch:x86
90e5ef586567ce1dfa50aa0ad2edf52f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameW
MultiByteToWideChar
FindFirstFileA
GetProcAddress
FindClose
RemoveDirectoryW
FindNextFileA
GetModuleHandleA
ReleaseMutex
GetVersionExA
DeleteFileW
SetEvent
GetPrivateProfileStringW
CreateEventA
CreateDirectoryA
CreateMutexA
OutputDebugStringA
FreeLibrary
LoadLibraryA
LocalFree
lstrcpynA
GetDriveTypeA
GetVolumeInformationA
DeviceIoControl
MoveFileExA
Process32First
GetFileAttributesA
TerminateProcess
GetSystemDirectoryA
GetLastError
GetLocalTime
Process32Next
CreateToolhelp32Snapshot
lstrlenA
lstrcpynW
GetFileAttributesW
lstrlenW
lstrcpyA
MapViewOfFile
InterlockedIncrement
GetPrivateProfileIntA
InterlockedExchange
InterlockedExchangeAdd
CreateFileMappingA
GetExitCodeThread
WaitForMultipleObjects
GetCurrentThreadId
CreateThread
SetEndOfFile
LeaveCriticalSection
EnterCriticalSection
SetLastError
CreateSemaphoreA
CreateFileW
ReleaseSemaphore
GetLogicalDriveStringsA
GlobalMemoryStatusEx
GetSystemInfo
GetDiskFreeSpaceExA
ReadFile
SetThreadPriority
GetThreadTimes
ResumeThread
CompareStringW
CompareStringA
GetProcessHeap
GetTimeZoneInformation
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapSize
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
LCMapStringW
LCMapStringA
HeapCreate
VirtualAlloc
VirtualFree
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStdHandle
InterlockedDecrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
FileTimeToLocalFileTime
FileTimeToSystemTime
MoveFileA
IsDebuggerPresent
SetUnhandledExceptionFilter
FormatMessageW
CopyFileW
WideCharToMultiByte
GetVolumePathNameW
WriteFile
FormatMessageA
GetEnvironmentVariableA
CreateDirectoryW
SetFilePointer
GetFileSize
GetComputerNameA
DeleteFileA
GetTempPathA
CreateFileA
GetCurrentProcessId
CloseHandle
GetModuleFileNameA
GetTempFileNameA
CopyFileA
RemoveDirectoryA
lstrcmpiA
CreateProcessA
Sleep
OpenProcess
WaitForSingleObject
CreateProcessW
GetCurrentThread
UnhandledExceptionFilter
GetCurrentProcess
HeapReAlloc
HeapFree
ExitThread
GetSystemTimeAsFileTime
HeapAlloc
ExitProcess
GetModuleHandleW
SetFileAttributesA
user32
MapWindowPoints
LoadImageA
IsWindowVisible
GetSystemMetrics
RegisterClassW
MessageBoxW
DispatchMessageA
CreateWindowExW
CreatePopupMenu
SetLayeredWindowAttributes
GetCursorPos
SetWindowPos
SetWindowLongW
CreateWindowExA
PeekMessageA
UpdateWindow
AppendMenuW
GetWindowLongW
InvalidateRect
SetWindowLongA
OffsetRect
ChildWindowFromPoint
TranslateMessage
IsDialogMessageA
SendMessageA
SetFocus
GetClientRect
IsWindowEnabled
LoadIconA
SetForegroundWindow
GetWindowDC
TrackPopupMenu
EnableWindow
AdjustWindowRect
LoadCursorA
GetDlgCtrlID
DefWindowProcW
FlashWindowEx
MoveWindow
DefWindowProcA
ShowWindow
wvsprintfA
GetActiveWindow
PostThreadMessageA
SetActiveWindow
GetWindowRect
GetMessageA
DestroyWindow
RegisterClassA
wsprintfW
PostMessageA
SetWindowTextA
wsprintfA
MessageBoxA
ReleaseDC
CopyRect
gdi32
DeleteDC
CreateDIBSection
GetDIBits
DeleteObject
SelectObject
CreateCompatibleDC
GetStockObject
BitBlt
advapi32
RegCloseKey
RegQueryValueW
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyW
OpenSCManagerA
CloseServiceHandle
OpenServiceA
RegSetValueExW
RegQueryValueExW
RegSetValueW
RegSetValueA
FreeSid
GetUserNameA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
shell32
SHGetFolderPathW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
Shell_NotifyIconA
SHGetSpecialFolderPathA
SHChangeNotify
ShellExecuteA
ole32
OleUninitialize
OleInitialize
OleCreate
OleSetContainedObject
CoTaskMemFree
StringFromIID
CLSIDFromProgID
CoInitialize
CoUninitialize
CoTaskMemAlloc
CoCreateGuid
CoCreateInstance
oleaut32
SafeArrayCreateVector
VariantTimeToSystemTime
VariantCopy
VariantChangeType
VariantInit
VariantClear
SysAllocString
SysFreeString
SysAllocStringLen
SysStringLen
SafeArrayUnaccessData
SafeArrayAccessData
wsock32
WSAStartup
gethostbyname
inet_addr
ioctlsocket
htonl
WSAGetLastError
htons
ntohs
getservbyport
getservbyname
WSASetLastError
gethostbyaddr
WSACleanup
wininet
InternetConnectA
InternetOpenUrlA
InternetCrackUrlA
InternetOpenA
InternetQueryOptionA
HttpSendRequestA
HttpOpenRequestA
InternetSetOptionA
InternetGetLastResponseInfoA
HttpQueryInfoA
InternetReadFile
InternetOpenUrlW
InternetOpenW
InternetCreateUrlA
InternetCrackUrlW
InternetCloseHandle
shlwapi
PathCanonicalizeA
PathAppendA
SHDeleteKeyA
PathCanonicalizeW
PathAppendW
StrStrA
UrlGetPartA
psapi
GetModuleFileNameExA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
ws2_32
WSAAddressToStringA
urlmon
CoInternetGetSession
Exports
Exports
?CreateDefaultBrowserInfo@@YGPAVIDefaultBrowserInfo@@XZ
?CreateDirectXVersionInfo@@YGPAVIDirectXVersionInfo@@XZ
?CreateDisplaysDeviceInfo@@YGPAVIDisplayDevicesInfo@@XZ
?CreateFixedDriveInfo@@YGPAVIFixedDriveInfo@@XZ
?CreateFixedDrivesInfo@@YGPAVIFixedDrivesInfo@@XZ
?CreateFlashInfo@@YGPAVIFlashInfo@@XZ
?CreateIEVersionInfo@@YGPAVIIEVersionInfo@@XZ
?CreateMacAddress@@YGPAVIMacAddress@@XZ
?CreateMachineInfo@@YGPAVIMachineInfo@@XZ
?CreateMachineInfoXML@@YGPAVIMachineInfoXML@@XZ
?CreateOSInfo@@YGPAVIOSInfo@@XZ
?CreateProcessorsInfo@@YGPAVIProcessorsInfo@@XZ
?CreateRamInfo@@YGPAVIRamInfo@@XZ
?CreateSoundDevicesInfo@@YGPAVISoundDevicesInfo@@XZ
?CreateUserExperience@@YGPAVIUserExperience@@XZ
?CreateVMInfo@@YGPAVIVMInfo@@XZ
Sections
.text Size: 361KB - Virtual size: 361KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ