c:\Users\andrew\Desktop\ADE2[2010]_Union\Release\ptgaoqing_183.pdb
Static task
static1
Behavioral task
behavioral1
Sample
62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118
-
Size
292KB
-
MD5
62ed18c745f90e5967ab39d6ca93af8f
-
SHA1
4d310285aa86a72edde2b50206dea06ba0e1dc3b
-
SHA256
301fb1ff039d383584b90f9bbce74b49d271b3566e1568f34c3ac87b1e20230e
-
SHA512
cf174a6cc871d6cf2dce9b3223831dbecafa5b73ee9bf238349b50f87cedeb3b94a4d215aa3fcbd10b402679b54eff1b929deb1f728c6e356b25fe2d3a5c7c9d
-
SSDEEP
6144:33s8C5BKmvXmh0gP+SsURd7tUVT1cEzL4BE:MwOOP4jmE1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118
Files
-
62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe windows:4 windows x86 arch:x86
6e5d382ddd39dc5b44fdb2a2fb12d1b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCPInfo
GetOEMCP
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
ExitThread
CreateThread
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
ExitProcess
RaiseException
HeapSize
SetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
SetErrorMode
GetACP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTickCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetFileTime
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageA
LocalFree
SuspendThread
SetThreadPriority
WritePrivateProfileStringA
GlobalAddAtomA
GetCurrentProcessId
SetLastError
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
lstrcmpA
FreeLibrary
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
FreeResource
ResumeThread
CloseHandle
ResetEvent
GlobalFree
GlobalUnlock
MulDiv
CreateEventA
GlobalAlloc
SetEvent
GlobalLock
DeleteFileA
GetTempPathA
GetModuleFileNameA
LockResource
GetLocalTime
GetModuleFileNameW
GetFileAttributesA
SizeofResource
Sleep
WaitForSingleObject
LoadResource
FindResourceA
GetVersion
CompareStringA
CreateMutexA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
WideCharToMultiByte
lstrlenA
GetStdHandle
user32
LoadCursorA
GetSysColorBrush
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
UnhookWindowsHookEx
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindow
SetFocus
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
DestroyMenu
AdjustWindowRectEx
UnregisterClassA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
FillRect
GetDC
SetRect
InvalidateRect
ReleaseDC
GetSysColor
CopyRect
IsIconic
LoadIconA
DrawIcon
FindWindowExA
GetClientRect
SendMessageA
GetWindowTextA
EnumChildWindows
IsWindow
PostMessageA
GetSystemMetrics
EnableWindow
FindWindowA
CharUpperA
gdi32
GetStockObject
GetObjectA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateSolidBrush
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
BitBlt
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
CryptGetHashParam
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
shell32
SHGetFolderPathA
ShellExecuteExA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
OleLoadPicture
SysAllocString
SysStringLen
SysFreeString
VariantClear
VariantChangeType
VariantInit
wininet
InternetQueryDataAvailable
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetErrorDlg
FtpGetFileA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
Sections
.text Size: 212KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ