c:\SUPERAdBlocker Projects\SUPERAdBlocker\SUPER Ad Blocker Update\SuperAntiSpyware_Release\SSUpdate.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4bda582b563c3b5bfd4b259cdd54eee3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4bda582b563c3b5bfd4b259cdd54eee3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4bda582b563c3b5bfd4b259cdd54eee3_JaffaCakes118
-
Size
378KB
-
MD5
4bda582b563c3b5bfd4b259cdd54eee3
-
SHA1
7011cacd9b8f9f16fd7efeaec3c92e30536e1b68
-
SHA256
fcb2a1c807b69680fc29276d9b433868badbd1cf9c84805a354fbc1c025747c1
-
SHA512
3ab5404ad6ebdd347e1f41b8a31a08b6bad143502f60997b37509f86449912c3eced2227b8aeffa4ef576c96ff9896c6dd04366c836283849e81db7fb93d826a
-
SSDEEP
6144:sHIJyT2ovFFTzD/NSTLsB+4+lN/MELWqfFyjVVd:sHIJyiov3zkTwBgeELWqfFyjp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bda582b563c3b5bfd4b259cdd54eee3_JaffaCakes118
Files
-
4bda582b563c3b5bfd4b259cdd54eee3_JaffaCakes118.exe windows:5 windows x86 arch:x86
da3408a3e9ec6b601949bded8fcd8ecc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
CreateFileA
DeviceIoControl
GetLocalTime
lstrcatA
FreeLibrary
GetProcAddress
LoadLibraryA
Sleep
GetTickCount
lstrlenA
CreateFileW
ReadFile
WriteFile
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindClose
GetFileSize
SetFilePointer
DeleteFileA
DeleteFileW
CopyFileA
CopyFileW
CreateDirectoryA
CreateDirectoryW
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
MoveFileExA
MoveFileExW
GetFileTime
GetShortPathNameA
GetShortPathNameW
GetOverlappedResult
RemoveDirectoryA
RemoveDirectoryW
BackupRead
BackupSeek
FlushFileBuffers
GetTempFileNameA
GetTempFileNameW
CreateEventA
CreateEventW
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Toolhelp32ReadProcessMemory
ReadProcessMemory
Module32First
Module32FirstW
Module32Next
Module32NextW
Process32First
Process32FirstW
Process32Next
Process32NextW
SetPriorityClass
GetPriorityClass
GetVersionExA
lstrlenW
HeapFree
HeapAlloc
GetProcessHeap
MultiByteToWideChar
LocalFree
SetNamedPipeHandleState
WaitNamedPipeA
SetLastError
lstrcpynA
lstrcpyA
UnmapViewOfFile
MulDiv
lstrcmpiA
SystemTimeToFileTime
GetSystemInfo
GetModuleHandleA
GetTempPathA
GetWindowsDirectoryA
GetCurrentDirectoryA
ResetEvent
CreateThread
GetExitCodeThread
SetEvent
GlobalAddAtomA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
GetStdHandle
ExitProcess
HeapSize
InterlockedDecrement
InterlockedIncrement
GetSystemTime
GetCurrentProcessId
GetCurrentThreadId
TlsGetValue
TlsSetValue
TlsFree
DeleteCriticalSection
CloseHandle
TlsAlloc
WideCharToMultiByte
InitializeCriticalSection
GetModuleHandleW
GetConsoleMode
GetConsoleCP
GetStartupInfoA
GetCommandLineA
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
InterlockedExchange
LocalAlloc
GetModuleFileNameA
GetLastError
user32
IsWindow
EndPaint
DrawTextA
GetWindowRect
DrawEdge
BeginPaint
CallWindowProcA
SetCursor
LoadCursorA
GetSystemMetrics
MoveWindow
CreateWindowExA
SendMessageA
ExitWindowsEx
GetClientRect
InflateRect
GetSysColor
FillRect
SetDlgItemTextA
MessageBoxA
GetDlgItem
GetParent
SetForegroundWindow
SetWindowPos
LoadIconA
RegisterClassA
ShowWindow
DispatchMessageA
TranslateMessage
KillTimer
PostQuitMessage
DefWindowProcA
SetTimer
FindWindowA
RegisterWindowMessageA
SystemParametersInfoA
GetDC
ReleaseDC
PostMessageA
EnumChildWindows
GetClassNameA
SetWindowLongA
DestroyWindow
GetWindowLongA
GetWindowTextA
GetMessageA
gdi32
SetBkMode
SelectObject
SetTextColor
DeleteObject
SetGraphicsMode
ModifyWorldTransform
SetViewportOrgEx
SetWindowOrgEx
GetDeviceCaps
CreateFontIndirectA
CreateSolidBrush
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteExA
ole32
OleUninitialize
OleInitialize
oleaut32
SysAllocString
VarBstrCat
SysFreeString
SysStringByteLen
SysStringLen
SysAllocStringLen
shlwapi
SHDeleteKeyA
SHDeleteKeyW
SHDeleteValueA
SHDeleteValueW
SHCopyKeyA
SHCopyKeyW
PathAppendA
PathFindFileNameA
StrCpyW
StrStrIA
PathRemoveBackslashA
StrStrA
SHSetValueW
SHSetValueA
SHGetValueW
SHGetValueA
PathRemoveFileSpecA
PathFindNextComponentA
PathFileExistsA
PathAddBackslashA
PathFileExistsW
PathIsDirectoryA
PathIsDirectoryW
comctl32
CreatePropertySheetPageA
InitCommonControlsEx
PropertySheetA
wininet
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
version
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
GetFileVersionInfoA
GetFileVersionInfoW
VerQueryValueA
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ