e:\Rel_2008_q2\AntiVir\avscan\UNICODE_Release\avscan.pdb
Static task
static1
Behavioral task
behavioral1
Sample
647667f30b7f44655a86ccbaa603f01f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
647667f30b7f44655a86ccbaa603f01f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
647667f30b7f44655a86ccbaa603f01f_JaffaCakes118
-
Size
380KB
-
MD5
647667f30b7f44655a86ccbaa603f01f
-
SHA1
8faca573a6639a1d33435ca26687b0e7f0dc9e06
-
SHA256
ce70713b464f90469235bee13bec49ce381b05929652df912ac6bd2677059bf7
-
SHA512
d43834fb18a07ae8c8cab3eb39cd0f277e8531efa2aa152819bcb29a1c763d1967d6e21d5ae2925804850fda30d6460e96488288b46035e5ce8e1be77b2a49b0
-
SSDEEP
6144:GKjgYfUFHb/3/t79srxa3/trdq7ehe6WB1coejB11n68M8HUAi/7wxb1:JgyUFr3F7qE3/ldqTcpV/Z55i/UJ1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 647667f30b7f44655a86ccbaa603f01f_JaffaCakes118
Files
-
647667f30b7f44655a86ccbaa603f01f_JaffaCakes118.exe windows:4 windows x86 arch:x86
640b7aafba5c377df9f9a5122dcc7e22
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
winmm
sndPlaySoundW
mfc71u
ord1646
ord1647
ord1536
ord5414
ord3756
ord777
ord2397
ord2409
ord2386
ord2390
ord2392
ord2394
ord2384
ord5229
ord5231
ord5558
ord860
ord1472
ord896
ord4078
ord283
ord774
ord2926
ord282
ord1479
ord280
ord2311
ord776
ord899
ord577
ord293
ord1118
ord566
ord5096
ord1007
ord2009
ord4320
ord5636
ord5637
ord3995
ord5609
ord326
ord587
ord4226
ord1198
ord2366
ord2361
ord4117
ord3281
ord3395
ord4109
ord3417
ord4314
ord5727
ord1190
ord1271
ord3157
ord1925
ord3204
ord1091
ord1899
ord1894
ord2651
ord6116
ord572
ord760
ord4480
ord2856
ord5196
ord1955
ord5171
ord1353
ord4961
ord3339
ord6275
ord3796
ord6273
ord1513
ord2163
ord2169
ord2399
ord2381
ord2379
ord2402
ord2407
ord2388
ord2404
ord931
ord927
ord929
ord925
ord920
ord5956
ord1591
ord4276
ord4716
ord3397
ord5210
ord4179
ord6271
ord5067
ord5148
ord4238
ord1393
ord3940
ord1608
ord1611
ord5911
ord3590
ord3678
ord5209
ord2167
ord1299
ord1079
ord762
ord3824
ord1049
ord265
ord266
ord764
ord2239
ord757
ord4255
ord4475
ord3943
ord2638
ord3703
ord3713
ord3712
ord2527
ord2640
ord2534
ord2832
ord2708
ord4301
ord2829
ord2725
ord2531
ord5226
ord4562
ord3942
ord5222
ord5220
ord2925
ord1911
ord3826
ord5378
ord6215
ord3800
ord5579
ord2054
ord6274
ord3795
ord6272
ord4008
ord4032
ord3586
ord3677
ord1590
msvcr71
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_amsg_exit
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
memset
strtoul
_close
__security_error_handler
_lseek
_read
calloc
wcstok
rand
srand
realloc
iswalnum
iswspace
_wtol
vswprintf
wcsncmp
_chsize
_write
_controlfp
_filelength
_wgetcwd
_wchdir
_wunlink
_wstat
wcstombs
mbstowcs
_wchmod
_errno
_wsopen
printf
_wcsnicmp
towupper
fwrite
fflush
fclose
_wfopen
_wrename
_wsplitpath
swscanf
swprintf
wcsstr
wcsrchr
wcsncat
_wcsupr
malloc
_wtoi
_waccess
_vsnwprintf
time
_wcsicmp
wcscmp
wcscpy
wcschr
_snwprintf
wcsncpy
_except_handler3
free
_wcsdup
wcslen
_itow
wcscat
__CxxFrameHandler
kernel32
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
CreateEventW
ResetEvent
CreateThread
SetThreadPriority
WaitForMultipleObjects
ResumeThread
SuspendThread
Sleep
TerminateThread
CloseHandle
GetVersionExW
GetDiskFreeSpaceExW
OpenSemaphoreW
FlushFileBuffers
SetFilePointer
CreateMutexW
QueryPerformanceCounter
GlobalFree
GlobalAlloc
OpenProcess
OpenEventW
GetPrivateProfileStringW
GetExitCodeProcess
CreateProcessW
LocalFree
GetStartupInfoW
GetCurrentProcessId
GetTickCount
RaiseException
SystemTimeToFileTime
FileTimeToSystemTime
FormatMessageW
BackupRead
SetFileAttributesW
CreateDirectoryW
RemoveDirectoryW
GetPrivateProfileIntW
WaitForSingleObject
lstrcpynW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
CreateFileMappingW
LoadLibraryExW
GetCurrentThreadId
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
CreateSemaphoreW
ReleaseSemaphore
GetTempPathW
GetDateFormatW
GetLocalTime
ReadFile
GetFileSize
CreateFileW
InitializeCriticalSection
DeleteCriticalSection
GetFileAttributesW
GetLastError
HeapFree
DeviceIoControl
HeapAlloc
GetProcessHeap
GetDriveTypeW
GetLongPathNameW
MoveFileExW
WriteFile
Beep
lstrlenW
GetVolumeInformationW
SetErrorMode
FreeLibrary
GetProcAddress
LoadLibraryW
GetSystemTime
SetPriorityClass
GetPriorityClass
GetCurrentProcess
lstrcpyW
LeaveCriticalSection
EnterCriticalSection
ExitThread
InterlockedDecrement
SetEvent
LoadLibraryA
GetComputerNameW
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleFileNameW
GetModuleHandleW
WritePrivateProfileStringW
CopyFileW
GetVersionExA
TerminateProcess
InterlockedIncrement
user32
LoadStringW
ExitWindowsEx
LoadImageW
LoadIconW
DrawIconEx
DestroyIcon
InvalidateRect
GetDC
ScreenToClient
FillRect
InflateRect
CopyRect
DrawStateW
EnableWindow
GetActiveWindow
GetLastActivePopup
MessageBoxW
SendMessageW
ReleaseDC
GetParent
wsprintfW
DispatchMessageW
TranslateMessage
GetWindowRect
MessageBeep
GetSystemMetrics
IsWindow
PeekMessageW
gdi32
CreatePen
CreateSolidBrush
RoundRect
GetPixel
SetPixel
GetTextExtentPoint32W
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
GetUserNameW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteKeyW
LookupAccountSidW
OpenProcessToken
GetTokenInformation
CreateProcessAsUserW
SetSecurityInfo
SetEntriesInAclW
BuildExplicitAccessWithNameW
GetSecurityDescriptorDacl
GetSecurityInfo
FreeSid
EqualSid
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RevertToSelf
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
DuplicateTokenEx
SetThreadToken
RegEnumValueW
shell32
ShellExecuteW
comctl32
_TrackMouseEvent
ord17
ole32
CoInitialize
CoCreateInstance
Sections
.text Size: 216KB - Virtual size: 214KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE