d:\work\ServiceApp\SiteAppSrc\Seed\trunk\Bin\JJangFileDown.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5a72a9f8c7fd38af180a4ecb89431415_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5a72a9f8c7fd38af180a4ecb89431415_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
5a72a9f8c7fd38af180a4ecb89431415_JaffaCakes118
-
Size
561KB
-
MD5
5a72a9f8c7fd38af180a4ecb89431415
-
SHA1
9740e2548d1c999e80edef3f9fbf62c82c1b43dd
-
SHA256
45ee6585dfb2c8ea07bb7e7096d2f8a6ccf7d02f15c46a55e0636fb5fc68e931
-
SHA512
b72155b330410b0f7dfcdf0683ead4b635006ee1cc736ba8504f959040bb1bbe82ec37bbbe9259caa01011dc30fdaa6877c4b5f46dbf28317824bb4f9e27f563
-
SSDEEP
12288:6nO/EMDRQg5TM4OeKjGwgiUfZR8775ZE68:8a1+p4OeKjJgVZR835ZEh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a72a9f8c7fd38af180a4ecb89431415_JaffaCakes118
Files
-
5a72a9f8c7fd38af180a4ecb89431415_JaffaCakes118.exe windows:5 windows x86 arch:x86
1498e468408b46f0f762cc28b0051b32
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
iphlpapi
GetAdaptersInfo
crashreport
?StartFiltering@CCrashManager@@QAE_NXZ
?SetSitecode@CCrashManager@@QAEXH@Z
?SetUserId@CCrashManager@@QAEXV?$CStringT@DV?$StrTraitMFC@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@@Z
?GetInstance@CCrashManager@@SAPAV1@XZ
?SetVersion@CCrashManager@@QAEXV?$CStringT@DV?$StrTraitMFC@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@@Z
version
GetFileVersionInfoA
VerQueryValueA
kernel32
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
GetCurrentDirectoryA
GetFileAttributesA
GetFileSizeEx
GetFileTime
SetErrorMode
GetSystemTimeAsFileTime
ExitThread
CreateThread
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoA
HeapReAlloc
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
VirtualQuery
ExitProcess
SetStdHandle
GetFileType
HeapSize
GetACP
IsValidCodePage
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
TlsFree
GetEnvironmentStringsW
SetHandleCount
VirtualFree
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
LoadLibraryA
CreateMutexA
GetLastError
Sleep
GetModuleFileNameA
WideCharToMultiByte
SizeofResource
LockResource
LoadResource
FindResourceA
GetCommandLineA
FreeLibrary
CloseHandle
CreateDirectoryA
SetThreadPriority
GetCurrentThread
CreateEventA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
GetTickCount
GetSystemInfo
WaitForSingleObject
GetVolumeInformationA
OutputDebugStringA
MultiByteToWideChar
MulDiv
lstrcpyA
SetLastError
GetModuleHandleA
GetProcAddress
lstrlenA
lstrcpynA
GlobalAlloc
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
TlsGetValue
LocalAlloc
InterlockedIncrement
GetModuleHandleW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
CreateFileA
GetFullPathNameA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GetCurrentProcessId
GetModuleFileNameW
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
InterlockedExchange
lstrcmpA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
FreeResource
FormatMessageA
LocalFree
InterlockedDecrement
GetComputerNameA
GlobalMemoryStatusEx
VirtualFreeEx
ReadProcessMemory
VirtualAllocEx
OpenProcess
GetVersionExA
HeapAlloc
HeapDestroy
HeapFree
HeapCreate
GlobalReAlloc
TryEnterCriticalSection
GetExitCodeProcess
CreateProcessA
lstrlenW
GetDiskFreeSpaceExA
GetCurrentProcess
GlobalFree
GlobalUnlock
GlobalLock
FreeEnvironmentStringsW
user32
LoadAcceleratorsA
LoadMenuA
ReuseDDElParam
UnpackDDElParam
RegisterClipboardFormatA
PostThreadMessageA
IsRectEmpty
EndPaint
BeginPaint
GetWindowDC
CharUpperA
ShowOwnedPopups
GetMessageA
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
ScrollWindow
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
InsertMenuItemA
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetDlgCtrlID
DefWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
ReleaseCapture
WindowFromPoint
ClientToScreen
SetCapture
GetCapture
GetActiveWindow
ReleaseDC
MapWindowPoints
GetWindowThreadProcessId
EnableWindow
GetClassInfoA
SendMessageA
MessageBoxA
EnumChildWindows
GetClassNameA
LoadImageA
SetCursor
UpdateWindow
RedrawWindow
GetSysColor
GetParent
CallWindowProcA
SetRect
GetDC
GetSystemMetrics
SetWindowRgn
DispatchMessageA
TranslateMessage
PeekMessageA
ReplyMessage
ExitWindowsEx
IsWindowVisible
GetKeyState
SetWindowLongA
DestroyMenu
SetRectEmpty
BringWindowToTop
TranslateAcceleratorA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
TrackPopupMenu
SetForegroundWindow
CharNextA
UnregisterClassA
GetMenuItemInfoA
GetSysColorBrush
LoadCursorA
ShowScrollBar
DrawIcon
KillTimer
PostMessageA
SetTimer
SetWindowPos
GetWindowRect
ScreenToClient
InvalidateRect
GetClientRect
LoadBitmapA
DrawTextA
CopyRect
LoadIconA
FillRect
InflateRect
DrawIconEx
GetFocus
DrawFocusRect
GetWindowLongA
PtInRect
TabbedTextOutA
DrawTextExA
GrayStringA
CloseClipboard
OpenClipboard
EmptyClipboard
SetClipboardData
IsWindow
FindWindowA
ShowWindow
CloseWindow
CreatePopupMenu
AppendMenuA
SetMenuDefaultItem
GetCursorPos
SetWindowsHookExA
gdi32
CreateDCA
GetObjectA
SelectObject
DeleteDC
DeleteObject
CreateDIBSection
ExtCreateRegion
CombineRgn
CreateFontA
CreateRectRgn
GetPixel
CreateBitmap
SetMapMode
SetBkColor
GetClipBox
SetTextColor
SaveDC
RestoreDC
SetBkMode
GetDeviceCaps
SelectClipRgn
GetStockObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreatePatternBrush
CreateEllipticRgn
Ellipse
GetTextColor
GetRgnBox
Escape
ExtTextOutA
GetTextExtentPoint32A
Rectangle
CreatePen
CreateSolidBrush
CreateFontIndirectA
StretchBlt
GetBkColor
BitBlt
DPtoLP
TextOutA
RectVisible
PtVisible
SetRectRgn
CreateRectRgnIndirect
GetViewportExtEx
GetWindowExtEx
GetMapMode
CreateCompatibleBitmap
LPtoDP
CreateCompatibleDC
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
LookupPrivilegeValueA
RegQueryValueA
RegOpenKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegEnumKeyA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
AdjustTokenPrivileges
OpenProcessToken
shell32
Shell_NotifyIconA
SHGetSpecialFolderPathA
ShellExecuteA
DragFinish
DragQueryFileA
SHGetFileInfoA
comctl32
ord17
shlwapi
StrFormatByteSize64A
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathGetArgsA
PathRemoveFileSpecW
oledlg
ord8
ole32
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
OleInitialize
CoFreeUnusedLibraries
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitializeEx
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRevokeClassObject
OleUninitialize
OleIsCurrentClipboard
oleaut32
VariantClear
SysAllocStringByteLen
SysAllocStringLen
SysStringLen
VariantChangeType
VariantInit
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocString
OleCreateFontIndirect
SysFreeString
wsock32
connect
WSASetLastError
setsockopt
inet_ntoa
WSAGetLastError
recv
__WSAFDIsSet
select
ioctlsocket
htons
closesocket
socket
WSAStartup
WSACleanup
ws2_32
WSAWaitForMultipleEvents
WSAConnect
WSACloseEvent
WSAEnumNetworkEvents
WSASocketA
WSACreateEvent
WSARecv
WSASetEvent
WSASend
WSAEventSelect
Exports
Exports
??0CCrashManager@@QAE@ABV0@@Z
??4CCrashManager@@QAEAAV0@ABV0@@Z
Sections
.text Size: 403KB - Virtual size: 403KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ