d:\_svn\xpsecuritycenter\release\TotalVirusProtection.pdb
Static task
static1
Behavioral task
behavioral1
Sample
63b403454ae73df63af131a35c1427c4_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
63b403454ae73df63af131a35c1427c4_JaffaCakes118
-
Size
1.6MB
-
MD5
63b403454ae73df63af131a35c1427c4
-
SHA1
291f29e4ef102671662472cd7fb9b0d58a6c3230
-
SHA256
3659d026219244cfd4f35a06922ed10c4198a15d0a8069a4ccfebea377ec4e89
-
SHA512
541cf712fcdbd8256d807c73626a1596a957f6f5dfc43741a00f8f80f124ca341a6857c6e7720de1420912f2529eb17c9978f839a0ac1c457037358953ec3ced
-
SSDEEP
24576:OSW/wKhpkNBTCNSft3okj8+8xLT+2+xWAnQ8BYra3tsOgynJsZQRIa0lQNeoW/Y:rWbhmok2Zy2+xznIar+blQNe1Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63b403454ae73df63af131a35c1427c4_JaffaCakes118
Files
-
63b403454ae73df63af131a35c1427c4_JaffaCakes118.exe windows:4 windows x86 arch:x86
f501dec85ed34bd6b354c233f3e3339a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapFree
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetTimeFormatA
GetDateFormatA
ExitThread
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
HeapSize
GetStdHandle
GetACP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
GetTimeZoneInformation
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
WideCharToMultiByte
SizeofResource
GetComputerNameA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetFileTime
GetFileAttributesA
LockResource
LoadResource
FileTimeToLocalFileTime
SetErrorMode
GetFullPathNameA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
LockFileEx
GetTempPathW
CreateFileW
GetFileAttributesW
LoadLibraryW
GetFullPathNameW
AreFileApisANSI
GetSystemTime
DeleteFileW
CompareFileTime
ReleaseSemaphore
CreateSemaphoreA
GetTempPathA
FindResourceExW
FindResourceW
WriteProcessMemory
lstrcpynA
InterlockedCompareExchange
GetModuleFileNameA
FindResourceA
CloseHandle
CreateMutexA
ReleaseMutex
GetLastError
MultiByteToWideChar
Sleep
lstrcatA
CreateThread
CreateFileA
TerminateThread
GetFileSize
DeleteFileA
SuspendThread
ResumeThread
CompareStringA
CompareStringW
InterlockedExchange
GetVersion
lstrcmpiA
lstrlenW
GetStringTypeExA
lstrlenA
GetLocalTime
CreateEventA
ResetEvent
WaitForSingleObject
GetPrivateProfileSectionNamesA
GetModuleHandleA
GetCurrentProcess
FindFirstFileA
FindNextFileA
FindClose
GetCommandLineA
GetCurrentProcessId
OpenProcess
TerminateProcess
ReadFile
FileTimeToSystemTime
GetThreadLocale
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
InterlockedDecrement
GetModuleFileNameW
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
SetLastError
lstrcmpW
GetProcAddress
WaitForMultipleObjects
CreateProcessA
FlushFileBuffers
SetFilePointer
SetEvent
WriteFile
FreeResource
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
LeaveCriticalSection
EnterCriticalSection
VirtualFreeEx
ReadProcessMemory
VirtualAllocEx
lstrcpyA
FindResourceExA
GetVersionExA
GetVolumeInformationA
GetExitCodeThread
GetPrivateProfileStringA
user32
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MapVirtualKeyA
GetKeyNameTextA
GetMenuStringA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
BeginPaint
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
SendMessageA
SetWindowPos
EnableWindow
EndPaint
RegisterWindowMessageA
LoadIconA
LoadStringA
GetWindowTextA
GetLastActivePopup
SetActiveWindow
GetDlgItem
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
TrackPopupMenuEx
TrackPopupMenu
SetScrollPos
CopyAcceleratorTableA
IsRectEmpty
SetRect
InvalidateRgn
ReleaseCapture
GetNextDlgGroupItem
MessageBeep
GetMenu
ValidateRect
WindowFromPoint
InflateRect
GetMenuItemInfoA
DestroyMenu
SetCursor
MapDialogRect
DestroyIcon
SetWindowContextHelpId
GetSysColorBrush
UnregisterClassA
CharNextA
GetClassNameA
GetForegroundWindow
PostMessageA
GetParent
RegisterClipboardFormatA
SetRectEmpty
InsertMenuItemA
LoadMenuA
GetSystemMenu
SetForegroundWindow
GetWindowRect
PostQuitMessage
IsIconic
LoadImageA
GetSystemMetrics
GetClientRect
DrawIcon
GetCursorPos
KillTimer
SetClassLongA
LoadCursorA
SetCursorPos
CreatePopupMenu
SetCapture
AppendMenuA
IsWindowVisible
BringWindowToTop
GetAsyncKeyState
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
GetScrollInfo
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
OffsetRect
IntersectRect
GetWindowPlacement
PostThreadMessageA
GetDC
IsWindow
ReleaseDC
FillRect
CharLowerBuffA
MsgWaitForMultipleObjects
PeekMessageA
IsWindowUnicode
GetMessageW
GetMessageA
TranslateMessage
DispatchMessageW
DispatchMessageA
SetWindowRgn
CopyRect
GetDesktopWindow
FindWindowExA
DrawFocusRect
GetComboBoxInfo
DestroyCursor
IsZoomed
SetMenuDefaultItem
LoadImageW
LoadCursorW
LoadIconW
LoadBitmapW
LoadStringW
GetMenuItemRect
FrameRect
SetMenuItemInfoA
GetMenuDefaultItem
IsMenu
EnableScrollBar
UnionRect
CopyImage
LookupIconIdFromDirectoryEx
CreateIconFromResourceEx
DrawStateA
InvalidateRect
MapWindowPoints
GetWindowThreadProcessId
DestroyWindow
CreateWindowExA
wsprintfA
SystemParametersInfoA
GetKeyState
SetTimer
GetWindow
FindWindowA
SetParent
RedrawWindow
CharUpperA
LoadBitmapA
UpdateWindow
gdi32
SetMapMode
ExcludeClipRect
LineTo
MoveToEx
DeleteObject
SelectClipRgn
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreatePen
ExtCreatePen
CreateSolidBrush
CreateFontIndirectA
GetTextMetricsA
CombineRgn
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
CreateCompatibleBitmap
SetStretchBltMode
SetBkMode
RestoreDC
SaveDC
PatBlt
CreateRectRgnIndirect
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateRectRgn
CreateRoundRectRgn
Rectangle
CreateEllipticRgn
GetDIBits
GetBkMode
CreateDIBitmap
CreateBrushIndirect
SetBitmapBits
GetBitmapBits
SetPixel
SelectObject
CreateFontA
StretchBlt
GetTextExtentPoint32A
GetStockObject
GetObjectA
CreateCompatibleDC
BitBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryInfoKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegNotifyChangeKeyValue
RegCloseKey
RegEnumValueA
RegEnumKeyExA
GetUserNameA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyA
shell32
SHGetFolderPathA
SHAppBarMessage
Shell_NotifyIconA
SHGetSpecialFolderPathA
ShellExecuteExA
ShellExecuteA
comctl32
_TrackMouseEvent
ImageList_GetIconSize
ImageList_Draw
ImageList_DrawEx
ImageList_GetImageInfo
InitCommonControlsEx
ImageList_GetImageCount
shlwapi
StrStrIA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathCombineA
PathIsDirectoryA
PathFileExistsA
StrStrA
PathAppendA
PathRenameExtensionA
PathAddBackslashA
PathRemoveFileSpecA
oledlg
ord8
ole32
OleInitialize
OleRun
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRevokeClassObject
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
CoFreeUnusedLibraries
OleUninitialize
oleaut32
VariantClear
VariantInit
SysAllocStringByteLen
SysStringLen
VarBstrCmp
SysAllocString
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
SafeArrayGetVartype
SysFreeString
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocStringLen
VariantChangeType
dbghelp
ImageDirectoryEntryToData
wininet
InternetSetOptionA
InternetOpenUrlA
InternetSetCookieA
FindFirstUrlCacheEntryExA
FindCloseUrlCache
FindNextUrlCacheEntryExA
InternetSetFilePointer
InternetReadFile
InternetGetLastResponseInfoA
InternetCanonicalizeUrlA
InternetGetCookieA
InternetCloseHandle
HttpQueryInfoA
InternetOpenA
psapi
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
iphlpapi
GetAdaptersInfo
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
msimg32
AlphaBlend
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 220KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 541B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ