D:\_PROJECTS\_Branches\UWFX5\_Release\WinFixer2005.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5b52e2d5c3e5d778bf1de0344f5779c0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5b52e2d5c3e5d778bf1de0344f5779c0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b52e2d5c3e5d778bf1de0344f5779c0_JaffaCakes118
-
Size
7.5MB
-
MD5
5b52e2d5c3e5d778bf1de0344f5779c0
-
SHA1
3a3d7f6ea04f83813382119ad378389f1e02e18e
-
SHA256
925b3e8c41300095f93184a1f4712f83f8458df234cdc2217d9ba583b8e8d23c
-
SHA512
020be222e31ee83e3c90dfff4cba96e969416d7ccd7d74e7b0241083962a0ae365cd27b5f768f7978678afafbe137ada77ae673dfd2373a9b9c7a6c34e4d15eb
-
SSDEEP
24576:rl59Zjg+mxzsM4/qvM0bnVvtORKR9ObrNYdStHN7TQ+WABzE:RwoOnVYGoaAW8E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b52e2d5c3e5d778bf1de0344f5779c0_JaffaCakes118
Files
-
5b52e2d5c3e5d778bf1de0344f5779c0_JaffaCakes118.exe windows:4 windows x86 arch:x86
dcc2f50ac913a992fe9fbf0657fcf39e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTempPathA
lstrcatA
IsDBCSLeadByte
LoadLibraryExA
GetModuleHandleA
CreateMutexA
InterlockedExchangeAdd
GetCommandLineA
GetFileAttributesExA
WritePrivateProfileStructA
GetTempFileNameA
GetCurrentDirectoryA
GetPrivateProfileStructA
GetPrivateProfileIntA
SetFileAttributesA
FlushFileBuffers
SetErrorMode
SetUnhandledExceptionFilter
LocalFree
GetProcessHeap
HeapFree
FindResourceA
LoadResource
SizeofResource
LockResource
FreeLibrary
TerminateProcess
GetExitCodeProcess
ReadFile
GetCurrentProcess
SetLastError
GetFileAttributesA
MulDiv
lstrcpynA
OpenEventA
lstrcmpiA
GetCurrentProcessId
Thread32First
Thread32Next
GetCurrentThreadId
SuspendThread
ResumeThread
Process32First
GetSystemTimeAsFileTime
Process32Next
CreateToolhelp32Snapshot
GetLogicalDriveStringsA
CreateDirectoryA
lstrlenW
GetVersion
DeleteFileA
CopyFileA
WideCharToMultiByte
FindNextFileA
LoadLibraryA
GetProcAddress
SetEvent
ResetEvent
CreateEventA
GetDiskFreeSpaceA
FindClose
GetLogicalDrives
GetDriveTypeA
FindFirstFileA
CreateProcessA
EnterCriticalSection
GetLocalTime
WriteFile
LeaveCriticalSection
CreateFileA
SetFilePointer
GetModuleFileNameA
Sleep
lstrcpyA
InterlockedDecrement
MultiByteToWideChar
OpenProcess
SetPriorityClass
CloseHandle
lstrlenA
GetPrivateProfileStringA
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
GetDateFormatA
GetTimeFormatA
GetLastError
WaitForSingleObject
CreateThread
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
WritePrivateProfileStringA
ExitProcess
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
DebugBreak
HeapAlloc
InterlockedExchange
wininet
InternetGetCookieA
InternetSetCookieA
idletrac
?IdleTrackerTerm@@YAXXZ
?IdleTrackerInit@@YAHXZ
mfc71
ord4244
ord4262
ord2168
ord4353
ord266
ord578
ord876
ord265
ord2902
ord3761
ord310
ord5731
ord4320
ord297
ord1489
ord299
ord2933
ord6118
ord1482
ord6065
ord6119
ord4035
ord744
ord4109
ord5346
ord555
ord304
ord4125
ord1395
ord3397
ord2322
ord784
ord3934
ord6179
ord6173
ord762
ord2272
ord781
ord6138
ord4085
ord3210
ord1934
ord4100
ord2094
ord3244
ord1955
ord3879
ord760
ord2092
ord1641
ord4238
ord2958
ord3230
ord658
ord1571
ord4115
ord6120
ord2164
ord6090
ord5613
ord1425
ord2372
ord3348
ord758
ord2264
ord2074
ord2075
ord567
ord3875
ord2794
ord2469
ord1185
ord5715
ord3161
ord1280
ord1063
ord651
ord416
ord745
ord911
ord907
ord1916
ord5563
ord5529
ord557
ord1564
ord1191
ord1187
ord3883
ord1917
ord5751
ord1654
ord2987
ord3328
ord754
ord1598
ord2496
ord3204
ord2657
ord5833
ord4118
ord2368
ord2367
ord2321
ord2131
ord6067
ord4081
ord3850
ord865
ord6283
ord577
ord2467
ord777
ord293
ord3596
ord1614
ord3908
ord5716
ord6168
ord3997
ord5403
ord2468
ord4108
ord908
ord3849
ord5491
ord1084
ord2654
ord629
ord584
ord1439
ord1434
ord317
ord5089
ord384
ord5805
ord298
ord3760
ord5059
ord4564
ord1401
ord2867
ord2271
ord783
ord2884
ord6306
ord3110
ord6180
ord1647
ord1589
ord739
ord3401
ord2660
ord709
ord5642
ord501
ord3641
ord3635
ord3595
ord1920
ord2931
ord5224
ord5227
ord3948
ord4569
ord5230
ord5213
ord5567
ord2838
ord4481
ord759
ord570
ord2249
ord326
ord4394
ord3684
ord3423
ord2160
ord1545
ord1377
ord4232
ord587
ord5710
ord6172
ord6178
ord3163
ord1279
ord5637
ord1931
ord1483
ord4098
ord2089
ord1547
ord4234
ord3171
ord591
ord657
ord602
ord1966
ord347
ord1929
ord589
ord3989
ord330
ord5647
ord6037
ord5727
ord1397
ord6266
ord1933
ord1570
ord4237
ord3430
ord3488
ord1484
ord4099
ord2091
ord4001
ord4123
ord5641
ord502
ord6017
ord4761
ord3454
ord1554
ord3195
ord620
ord2719
ord3799
ord2370
ord4350
ord6286
ord1930
ord5320
ord3680
ord3587
ord2876
ord4541
ord3683
ord4036
ord1248
ord1258
ord2451
ord757
ord2248
ord1128
ord1144
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord5226
ord4568
ord5566
ord3333
ord566
ord1024
ord6167
ord1101
ord593
ord5119
ord334
ord1054
ord3830
ord1126
ord3605
ord6006
ord1283
ord1794
ord1025
ord630
ord3088
ord2021
ord385
ord3255
ord5331
ord6297
ord262
ord6288
ord383
ord2495
ord5746
ord2882
ord3441
ord3302
ord5203
ord605
ord354
ord5623
ord4580
ord356
ord3287
ord4749
ord4078
ord2371
ord4648
ord4692
ord3473
ord5658
ord2090
ord1637
ord1558
ord4236
ord642
ord3651
ord1979
ord5634
ord2873
ord3337
ord3174
ord747
ord559
ord3835
ord6020
ord3952
ord1031
ord6236
ord1452
ord6310
ord5097
ord556
ord6040
ord6041
ord2306
ord3551
ord1643
ord715
ord1581
ord3139
ord3574
ord2346
ord5640
ord2234
ord1580
ord2233
ord2263
ord3437
ord1550
ord599
ord259
ord1971
ord2938
ord1092
ord3233
ord423
ord660
ord4063
ord866
ord5466
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord741
ord764
ord572
ord3317
ord4261
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2991
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord1908
ord5152
ord4240
ord1402
ord3946
ord1617
ord1620
ord5915
ord1591
ord2095
ord1903
ord5868
ord1207
msvcr71
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_beginthreadex
free
__CxxFrameHandler
_except_handler3
_strlwr
_flushall
_strcmpi
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
__security_error_handler
_vsnprintf
strrchr
memset
_snprintf
_mbsnbcpy
_stricmp
_strdup
exit
_setmbcp
_CxxThrowException
realloc
wcsncpy
_mbsstr
_mbsicmp
_mbslwr
_mbscmp
wcscmp
atoi
_mbctoupper
calloc
fread
strstr
fopen
fprintf
fclose
??0exception@@QAE@ABV0@@Z
_purecall
sprintf
malloc
_wcsicmp
_resetstkoflw
_mbsrchr
wcslen
memmove
swprintf
_scwprintf
user32
GetWindowThreadProcessId
ShowWindow
SetWindowPos
MessageBoxW
LoadBitmapA
ReleaseCapture
CopyRect
GetDC
ReleaseDC
GetWindowPlacement
InflateRect
GetSysColor
IsWindowVisible
RedrawWindow
GetParent
SetForegroundWindow
UpdateWindow
GetWindowRect
ClientToScreen
EnableWindow
SetCursor
LoadCursorA
PtInRect
GetDlgItem
UnregisterClassA
KillTimer
DispatchMessageA
GetMessageA
SetTimer
SendMessageA
IsWindow
GetWindowLongA
GetDesktopWindow
GetSystemMetrics
MessageBoxA
CallWindowProcA
DestroyMenu
IsZoomed
GetMenuItemID
EnableMenuItem
AppendMenuA
WindowFromPoint
UnhookWindowsHookEx
SystemParametersInfoA
SetRectEmpty
GetMenuItemRect
UnionRect
TrackPopupMenuEx
FrameRect
SetMenuItemInfoA
SetMenuItemBitmaps
GetMenuItemInfoA
GetMenuDefaultItem
GetMenuItemCount
GetMenuState
IsMenu
InsertMenuItemA
GetAsyncKeyState
DrawFocusRect
GetWindowTextA
SetWindowsHookExA
GetKeyboardState
SetKeyboardState
GetActiveWindow
keybd_event
GetKeyState
GetClientRect
EnableScrollBar
SetScrollPos
GetFocus
LoadMenuA
SetFocus
ScreenToClient
GetSubMenu
SetRect
IsRectEmpty
GetClassNameA
CallNextHookEx
GetSystemMenu
TrackPopupMenu
GetForegroundWindow
SetMenuDefaultItem
CreatePopupMenu
DrawIcon
BringWindowToTop
CharNextA
IsWindowEnabled
LoadIconA
GetCapture
MapWindowPoints
OffsetRect
GetComboBoxInfo
ValidateRect
GetDlgCtrlID
SetCapture
FillRect
DrawStateA
GetWindow
RegisterClassA
CreateWindowExA
SetWindowLongA
BeginPaint
EndPaint
GetWindowDC
LoadStringA
DrawTextA
TrackMouseEvent
PostQuitMessage
SetParent
IsIconic
PostMessageA
SetWindowRgn
PeekMessageA
TranslateMessage
GetCursorPos
FindWindowExA
InvalidateRect
FindWindowA
gdi32
DPtoLP
CreateBitmap
GetMapMode
SetMapMode
GetBitmapBits
SetBitmapBits
Rectangle
CreateBrushIndirect
SetStretchBltMode
GetTextColor
GetBkColor
GetBkMode
TextOutA
CreateEllipticRgn
GetPixel
CreateRectRgnIndirect
SetPixel
SetBkColor
CreateSolidBrush
GetDeviceCaps
StretchBlt
SetGraphicsMode
CombineTransform
SetWorldTransform
GetObjectA
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
CreatePen
SelectObject
SetBkMode
PatBlt
LineTo
MoveToEx
SetTextColor
BitBlt
DeleteDC
CreateFontIndirectA
GetTextExtentPoint32A
CreateRectRgn
CombineRgn
DeleteObject
CreateFontA
GetStockObject
msimg32
AlphaBlend
advapi32
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyA
CloseServiceHandle
EnumServicesStatusA
OpenSCManagerA
RegCreateKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
RegCloseKey
shell32
ShellExecuteA
SHAppBarMessage
SHGetPathFromIDListA
ord155
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetSpecialFolderPathA
ord18
ord21
ord25
Shell_NotifyIconA
SHGetMalloc
comctl32
ImageList_AddMasked
ImageList_DrawEx
ImageList_GetImageInfo
ImageList_GetIconSize
_TrackMouseEvent
ImageList_GetImageCount
ImageList_Draw
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_SetBkColor
ord17
shlwapi
PathFileExistsA
PathGetDriveNumberA
PathStripPathA
PathIsDirectoryEmptyA
PathIsDirectoryA
PathFindExtensionA
ole32
CoMarshalInterface
CreateStreamOnHGlobal
CoReleaseMarshalData
CoInitialize
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoUninitialize
CoUnmarshalInterface
CLSIDFromProgID
CoCreateGuid
StringFromCLSID
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
oleaut32
VariantInit
SysAllocString
VariantClear
SysAllocStringLen
SysAllocStringByteLen
SysStringByteLen
VariantChangeType
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
SystemTimeToVariantTime
SysFreeString
msvcp71
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
Sections
.text Size: 556KB - Virtual size: 553KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.9MB - Virtual size: 6.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ