d:\Source++\###NetNucleus\###Cleaning\FP\0611\Flipopia_recover_only(2010-11-05)\code\projets\contextuel_popper\exe\src\SAccRecover\Release_FP\FPRecover.pdb
Static task
static1
Behavioral task
behavioral1
Sample
48136014e6f02ea723036796760ac267_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
48136014e6f02ea723036796760ac267_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48136014e6f02ea723036796760ac267_JaffaCakes118
-
Size
340KB
-
MD5
48136014e6f02ea723036796760ac267
-
SHA1
352652f3ab44b372ea8ec4aef68cd16de256cff4
-
SHA256
ac146bd4eb97d0b93d5a8b00c801237d85e0a54c19498908a447d27b65ba0b5b
-
SHA512
56b89ed6e1220f5e9b962560d025c206845e965cd7c03518db87952c0f6d727b11832b910971affbd79a438b104ec9653ecfaec6f091f28cc91017a4b41d259f
-
SSDEEP
6144:aSeuhbFu+WLf8QyAoXEZQLoESf5qXTz1Z4IllMRPrtT7Oh8wzR:fZhpWLf8Q5koXm1ZjllOch1d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48136014e6f02ea723036796760ac267_JaffaCakes118
Files
-
48136014e6f02ea723036796760ac267_JaffaCakes118.exe windows:4 windows x86 arch:x86
638875871cc44d7d163bf990560a4efb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathStripToRootW
SHSetValueW
PathFindFileNameW
StrCatW
PathFileExistsW
PathAppendW
SHGetValueW
PathIsUNCW
wininet
InternetConnectW
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
HttpQueryInfoW
InternetReadFile
InternetOpenW
kernel32
InterlockedDecrement
GetVersion
GetModuleHandleA
GetFileAttributesW
GetFileTime
lstrcmpW
GlobalFlags
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
CompareStringA
GetLocaleInfoW
RaiseException
RtlUnwind
ExitProcess
UnhandledExceptionFilter
GetModuleHandleW
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
IsDebuggerPresent
HeapReAlloc
HeapSize
Sleep
GetStdHandle
GetModuleFileNameA
SetStdHandle
GetFileType
SetHandleCount
CreateFileA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
ReleaseSemaphore
CreateSemaphoreW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
CompareStringW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetLocalTime
GetCurrentThreadId
InterlockedIncrement
InterlockedCompareExchange
ReleaseMutex
WaitForSingleObject
LocalFree
FormatMessageW
GetSystemTime
FindFirstFileW
FindNextFileW
FindClose
SetLastError
CreateMutexW
CreateDirectoryW
GetComputerNameW
DeleteFileW
GetTempPathW
CreateFileW
GetModuleFileNameW
lstrlenW
WriteFile
CloseHandle
CreateProcessW
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetVersionExW
LoadLibraryW
GetProcAddress
GetCurrentProcessId
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
GetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
SetUnhandledExceptionFilter
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetWindowPos
SetWindowLongW
IsWindow
GetDlgItem
GetFocus
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowTextW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
CharUpperW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
RegisterWindowMessageW
DefWindowProcW
GetMessageExtraInfo
PostQuitMessage
MessageBoxW
wsprintfW
UnregisterClassA
gdi32
CreateBitmap
GetStockObject
ScaleWindowExtEx
DeleteDC
GetClipBox
SetMapMode
SetWindowExtEx
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegQueryInfoKeyW
RegEnumValueW
RegOpenKeyW
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
ShellExecuteW
ole32
CoInitializeEx
oleaut32
VariantInit
VariantChangeType
VariantClear
Exports
Exports
InetFunctionForRecover
Sections
.text Size: 248KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ