d:\source\Active\VoipClient\Output\VoipBuster\VoipBuster.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6239589a24953296bbf2e7d13281d625_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6239589a24953296bbf2e7d13281d625_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6239589a24953296bbf2e7d13281d625_JaffaCakes118
-
Size
4.3MB
-
MD5
6239589a24953296bbf2e7d13281d625
-
SHA1
f4c29f8710c4f34bd92b284ff4289b907c606e37
-
SHA256
c8f43fe7e1fb53e1cf850431252fc96c5b24374d1a4ecfc3b7548e22a39644f0
-
SHA512
7fbe0e5307f649e457737b38697e5a2de3e4829fc2ff899720629f594bdf22f2a63e72ba7f5ee2905a13aebd45188076d00e351d78380fc97ebbd50b9a9dc493
-
SSDEEP
98304:Raa7d5Fsk4TvdM6NxCMBjYFYRwqwgYRYdQ9ggoJIPl2lVlgD6QLdQhpHoJCDyoGl:Raa7d5Fsk0FM6XCMtYFYRwqwgYRYdQ91
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6239589a24953296bbf2e7d13281d625_JaffaCakes118
Files
-
6239589a24953296bbf2e7d13281d625_JaffaCakes118.exe windows:4 windows x86 arch:x86
d4607987310ea01f5af38249e2e3fe51
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dsound
ord2
ord11
kernel32
GetOEMCP
SetErrorMode
ExitProcess
RtlUnwind
ExitThread
CreateThread
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
VirtualProtect
VirtualQuery
GetFileType
GetTimeZoneInformation
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
HeapSize
UnhandledExceptionFilter
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
SetEvent
ResetEvent
FindResourceA
SizeofResource
LockResource
LoadResource
WideCharToMultiByte
ResumeThread
SetThreadPriority
GetSystemInfo
GetLastError
CreateIoCompletionPort
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
PostQueuedCompletionStatus
CloseHandle
WaitForSingleObject
GetQueuedCompletionStatus
GetTickCount
VirtualLock
VirtualAlloc
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetCurrentThreadId
CreateDirectoryA
GetCurrencyFormatA
CreateEventA
EnumResourceNamesA
EnumResourceTypesA
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileTime
GetFileSize
OpenFile
GetModuleFileNameA
GetExitCodeThread
GetComputerNameA
ReleaseMutex
WaitForMultipleObjects
CreateMutexA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
Sleep
DeleteFileA
CreateProcessA
TerminateProcess
GetExitCodeProcess
SetUnhandledExceptionFilter
GetCurrentProcess
GetCurrentProcessId
CreateFileA
GetWindowsDirectoryA
MulDiv
InterlockedDecrement
MultiByteToWideChar
lstrlenA
LocalFree
FormatMessageA
Beep
EnumResourceLanguagesA
FindResourceExA
LoadLibraryExA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
FindClose
FindFirstFileA
GetFileAttributesA
GlobalReAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
lstrcpynA
GetVersion
CompareStringW
CompareStringA
lstrlenW
lstrcmpiA
RaiseException
GlobalMemoryStatus
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
VirtualFreeEx
ReadProcessMemory
VirtualAllocEx
OpenProcess
VerifyVersionInfoA
VerSetConditionMask
SetCurrentDirectoryA
FindNextFileA
RemoveDirectoryA
SetThreadExecutionState
GetCurrentThread
InterlockedCompareExchange
QueryPerformanceCounter
QueryPerformanceFrequency
WinExec
lstrcpyA
LocalUnlock
LocalLock
LocalAlloc
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
SetFileTime
WriteFile
GetFileInformationByHandle
GetLocalTime
FreeResource
lstrcmpW
lstrcatA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
SetLastError
lstrcmpA
SuspendThread
MoveFileA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
FileTimeToLocalFileTime
InterlockedIncrement
ConvertDefaultLocale
GlobalFlags
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
user32
CallWindowProcA
IntersectRect
GetWindowPlacement
CreateDialogIndirectParamA
IsWindowEnabled
DialogBoxIndirectParamA
CheckDlgButton
SetFocus
SetWindowPos
SetWindowTextA
EndDialog
WinHelpA
GetWindowTextA
GetDialogBaseUnits
GetLastActivePopup
MessageBeep
DestroyCursor
CopyIcon
UnregisterHotKey
RegisterHotKey
IsZoomed
GetForegroundWindow
OpenClipboard
GetLastInputInfo
GetSystemMenu
InsertMenuA
GetKeyboardState
keybd_event
SetForegroundWindow
GetDoubleClickTime
GetClipboardData
CloseClipboard
DrawIcon
LoadStringA
MapWindowPoints
FindWindowA
EnumChildWindows
SetMenu
DrawMenuBar
GetMenuItemID
UnregisterClassA
CharUpperA
UpdateWindow
ShowWindow
AttachThreadInput
PostQuitMessage
RegisterClassA
CreateWindowExA
RegisterWindowMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
GetKeyState
SetRect
ShowScrollBar
IsIconic
GetMenu
UnionRect
CopyImage
GetFocus
MessageBoxA
SetWindowLongA
GetWindowLongA
WindowFromPoint
GetNextDlgTabItem
GetActiveWindow
ClientToScreen
FrameRect
EnableMenuItem
GetWindowThreadProcessId
EnumWindows
LoadIconA
EnableScrollBar
DrawFocusRect
SetWindowPlacement
DefWindowProcA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CopyRect
SetActiveWindow
IsRectEmpty
GetClassNameA
GetDlgItem
BeginPaint
EndPaint
PostThreadMessageA
RegisterClipboardFormatA
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
MoveWindow
GetTopWindow
GetDlgCtrlID
ModifyMenuA
GetMenuItemCount
SetMenuDefaultItem
LoadMenuA
GetSubMenu
CheckMenuItem
DeleteMenu
GetWindow
DrawStateA
SendNotifyMessageA
SetCapture
RedrawWindow
InvalidateRect
ScreenToClient
DrawFrameControl
OffsetRect
PtInRect
SetCursor
CallNextHookEx
InflateRect
EqualRect
SetRectEmpty
ReleaseCapture
UnhookWindowsHookEx
SetWindowsHookExA
LoadCursorA
GetSysColorBrush
RegisterClassExA
GetDesktopWindow
SystemParametersInfoA
SetScrollInfo
GetScrollInfo
DeferWindowPos
AdjustWindowRectEx
GetScrollPos
SetScrollPos
GetScrollRange
SetScrollRange
TrackPopupMenu
ScrollWindow
PeekMessageA
GetMessagePos
GetCursorPos
DestroyIcon
GetIconInfo
LoadImageA
GetDC
ReleaseDC
DrawIconEx
GetSysColor
SendMessageA
KillTimer
SetTimer
IsWindowVisible
GetWindowRect
PostMessageA
GetSystemMetrics
IsWindow
EnableWindow
GetParent
GetClientRect
SetWindowRgn
LoadBitmapA
GetMessageTime
EndDeferWindowPos
BeginDeferWindowPos
GetWindowTextLengthA
IsChild
GetClassInfoA
SendDlgItemMessageA
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
BringWindowToTop
TranslateAcceleratorA
CharNextA
DestroyMenu
GetMenuItemInfoA
ValidateRect
MapVirtualKeyA
GetKeyNameTextA
wsprintfA
MsgWaitForMultipleObjects
GetMenuStringA
GetWindowDC
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
IsDialogMessageA
SetDlgItemTextA
GetCapture
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
FillRect
RemovePropA
gdi32
GetRgnBox
CreateEllipticRgn
GetTextColor
CreateRectRgnIndirect
SelectPalette
CreatePatternBrush
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetTextAlign
MoveToEx
LineTo
ExcludeClipRect
SetMapMode
SetStretchBltMode
SetBkMode
RestoreDC
SaveDC
GetClipBox
SetTextJustification
SetDIBitsToDevice
StretchDIBits
CreateDCA
GetDeviceCaps
GetViewportOrgEx
SetViewportOrgEx
RealizePalette
CreateHalftonePalette
CreatePalette
GetDIBColorTable
GetPixel
SetPixel
CreateBitmap
SetBkColor
SetTextColor
CreateDIBSection
ExtCreateRegion
DeleteDC
Rectangle
Ellipse
CreatePen
SelectObject
Escape
GetTextMetricsA
ExtTextOutA
TextOutA
BitBlt
RectVisible
PtVisible
LPtoDP
DPtoLP
GetWindowExtEx
GetViewportExtEx
GetMapMode
GetBkColor
GetTextExtentPoint32A
CreateFontA
FrameRgn
OffsetRgn
EqualRgn
CombineRgn
CreateRoundRectRgn
CreatePolygonRgn
CreateRectRgn
CreateCompatibleBitmap
CreateFontIndirectA
CreateSolidBrush
GetStockObject
StretchBlt
CreateCompatibleDC
GetObjectA
DeleteObject
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegEnumKeyA
CryptReleaseContext
CryptGenKey
CryptGetUserKey
CryptAcquireContextA
CryptDestroyHash
CryptEncrypt
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptDecrypt
CryptImportKey
CryptExportKey
GetUserNameA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegDeleteValueA
RegConnectRegistryA
RegEnumValueA
CryptDestroyKey
RegOpenKeyA
RegQueryValueA
shell32
DragFinish
DragAcceptFiles
ShellExecuteExA
SHFileOperationA
SHGetMalloc
SHGetPathFromIDListA
DragQueryFileA
ShellExecuteA
Shell_NotifyIconA
SHGetSpecialFolderLocation
comctl32
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_Add
ImageList_AddMasked
ImageList_GetIcon
ImageList_Draw
ImageList_SetBkColor
ImageList_ReplaceIcon
_TrackMouseEvent
ImageList_DrawEx
ImageList_GetImageInfo
ord17
ImageList_Destroy
ImageList_Create
shlwapi
PathIsUNCA
UrlUnescapeA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
oledlg
ord8
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
OleRun
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoInitializeEx
CoUninitialize
OleIsCurrentClipboard
CoRegisterMessageFilter
OleFlushClipboard
oleaut32
SysAllocString
VariantClear
SysAllocStringByteLen
SysStringByteLen
VariantTimeToSystemTime
VarUdateFromDate
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
VariantInit
SafeArrayDestroy
SafeArrayPutElement
SafeArrayCreate
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocStringLen
OleLoadPicturePath
OleLoadPicture
VarDateFromStr
VariantChangeType
SysStringLen
SafeArrayGetElemsize
SafeArrayGetDim
VariantCopy
SysFreeString
OleCreateFontIndirect
GetErrorInfo
SystemTimeToVariantTime
ws2_32
select
WSAStartup
inet_ntoa
htonl
getservbyname
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
WSARecv
WSASend
WSAEventSelect
WSAConnect
listen
WSASetEvent
WSACloseEvent
WSAIoctl
WSACreateEvent
ntohl
connect
htons
send
recv
recvfrom
WSAGetOverlappedResult
WSASendTo
inet_addr
sendto
getsockname
WSASocketA
setsockopt
socket
getsockopt
bind
WSARecvFrom
WSACleanup
closesocket
ntohs
getservbyport
gethostbyaddr
gethostbyname
WSAGetLastError
gethostname
iphlpapi
GetIpAddrTable
GetIfTable
GetAdaptersInfo
wininet
InternetOpenUrlA
InternetConnectA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
FtpPutFileA
FtpSetCurrentDirectoryA
InternetQueryDataAvailable
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
winmm
mixerGetLineInfoA
mixerGetLineControlsA
mixerClose
mixerGetNumDevs
mixerOpen
mixerGetDevCapsA
PlaySoundA
waveInGetNumDevs
waveInGetDevCapsA
waveOutGetNumDevs
waveOutGetDevCapsA
mixerGetControlDetailsA
mixerSetControlDetails
waveOutReset
waveOutUnprepareHeader
waveOutWrite
waveOutPrepareHeader
waveOutOpen
waveOutClose
waveOutGetErrorTextA
timeGetTime
timeBeginPeriod
timeGetDevCaps
timeEndPeriod
timeKillEvent
timeSetEvent
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInStart
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveInGetPosition
waveInGetErrorTextA
mmioAscend
mmioRead
mmioClose
mmioDescend
mmioOpenA
mmioSeek
mmioSetInfo
mmioAdvance
mmioGetInfo
mmioWrite
mmioCreateChunk
pdh
PdhGetFormattedCounterValue
PdhCloseQuery
PdhCollectQueryData
PdhOpenQueryA
PdhAddCounterA
mswsock
AcceptEx
GetAcceptExSockaddrs
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 360KB - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ