D:\Work\AIDE\Anydata_Release\ADAR.pdb
Static task
static1
Behavioral task
behavioral1
Sample
67a4faa38d8b7d740adbcd7485f11954_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67a4faa38d8b7d740adbcd7485f11954_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67a4faa38d8b7d740adbcd7485f11954_JaffaCakes118
-
Size
357KB
-
MD5
67a4faa38d8b7d740adbcd7485f11954
-
SHA1
3022628c0e6bb975edd77b84507bf732d7b66744
-
SHA256
913d6018ba1fda49f4d266b1df6cb0f6e53716ad316cc92c723912f2ee61aea8
-
SHA512
0889c86eec2148a784cedf921d6b212608bb8ab52d9985b9bb6aa9aea85a41de82192e488d0d04fa4ef34b9b76f82c76dab8dbe16317dc07ea26b898eb307e98
-
SSDEEP
6144:P7McZFqnjdpWK8SQ0MY39t+53tUVdgmKZZLM2lnjTE8i5OEPJ:Q2K8SQZl2VIZZo2lnjTrEP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67a4faa38d8b7d740adbcd7485f11954_JaffaCakes118
Files
-
67a4faa38d8b7d740adbcd7485f11954_JaffaCakes118.exe windows:5 windows x86 arch:x86
a5ce333d09280f4316658e3df7ba4a83
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileSizeEx
GetFileTime
GetStartupInfoW
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
RtlUnwind
ExitProcess
HeapReAlloc
RaiseException
HeapSize
VirtualProtect
VirtualAlloc
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
IsDebuggerPresent
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
CreateFileA
FileTimeToLocalFileTime
GetTickCount
SetErrorMode
CreateFileW
FindFirstFileW
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
CreateMutexW
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
lstrlenA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetModuleHandleA
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
InterlockedDecrement
GetCurrentProcessId
GlobalAddAtomW
WritePrivateProfileStringW
FreeResource
SetLastError
GlobalFree
GlobalUnlock
MulDiv
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
WideCharToMultiByte
CompareStringA
MultiByteToWideChar
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
GetDateFormatW
FileTimeToSystemTime
lstrcpyW
GetCurrentProcess
LocalFree
FormatMessageW
FreeLibrary
LoadLibraryW
GetFileAttributesW
GetFullPathNameW
lstrcpynW
CreateThread
GetVolumeInformationW
GetDriveTypeW
Process32NextW
TerminateProcess
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
lstrlenW
GetModuleFileNameW
Sleep
FindResourceW
LoadResource
LockResource
SizeofResource
CloseHandle
CreateProcessW
GetSystemInfo
GetModuleHandleW
GetProcAddress
GetVersionExW
GetLastError
UnhandledExceptionFilter
user32
UnregisterClassW
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
GetSysColorBrush
ReleaseCapture
LoadCursorW
SetCapture
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextW
GetForegroundWindow
wsprintfW
CharUpperW
LoadIconW
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
RegisterClipboardFormatW
AdjustWindowRectEx
PostThreadMessageW
DrawTextExW
SendMessageW
IsIconic
GetSystemMetrics
GetClientRect
EnableWindow
LoadStringW
CharPrevW
ExitWindowsEx
CharNextW
PostMessageW
PostQuitMessage
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
SetWindowPos
MapDialogRect
GetParent
SetWindowContextHelpId
GetWindow
CheckMenuItem
EnableMenuItem
ModifyMenuW
GetFocus
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
ValidateRect
GetCursorPos
PeekMessageW
GetKeyState
IsWindowVisible
EqualRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
SetWindowLongW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSysColor
DestroyMenu
CopyRect
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
gdi32
GetMapMode
GetRgnBox
CreateRectRgnIndirect
GetTextColor
GetBkColor
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
GetDeviceCaps
CreateBitmap
GetObjectW
ExtTextOutW
GetClipBox
SetTextColor
SetBkColor
SaveDC
RestoreDC
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
CloseServiceHandle
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
RegSetValueExW
OpenSCManagerW
OpenServiceW
AdjustTokenPrivileges
RegDeleteValueW
OpenProcessToken
LookupPrivilegeValueW
RegCreateKeyExW
shell32
SHGetFileInfoW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
oledlg
OleUIBusyW
ole32
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleFlushClipboard
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoRegisterMessageFilter
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
winmm
mciSendCommandW
setupapi
SetupDiBuildClassInfoListExW
SetupDiClassNameFromGuidExW
SetupDiGetClassDescriptionExW
SetupDiClassGuidsFromNameExW
SetupDiGetClassDevsExW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiSetClassInstallParamsW
SetupDiCallClassInstaller
SetupDiGetDeviceInstallParamsW
SetupDiGetINFClassW
SetupDiCreateDeviceInfoList
SetupDiCreateDeviceInfoW
SetupDiSetDeviceRegistryPropertyW
SetupDiGetDeviceInfoListDetailW
CM_Get_Device_ID_ExW
CM_Connect_MachineW
CM_Locate_DevNode_ExW
CM_Reenumerate_DevNode_Ex
CM_Disconnect_Machine
SetupDiOpenClassRegKeyExW
CM_Get_DevNode_Status_Ex
SetupDiGetDeviceRegistryPropertyW
SetupDiCreateDeviceInfoListExW
SetupDiOpenDeviceInfoW
CM_Get_Next_Res_Des_Ex
CM_Free_Res_Des_Handle
CM_Get_Res_Des_Data_Ex
CM_Get_First_Log_Conf_Ex
CM_Free_Log_Conf_Handle
SetupDiOpenDevRegKey
SetupDiSetDeviceInstallParamsW
SetupDiBuildDriverInfoList
SetupDiEnumDriverInfoW
SetupDiGetDriverInfoDetailW
SetupDiDestroyDriverInfoList
SetupDiSetSelectedDriverW
SetupOpenFileQueue
SetupScanFileQueueW
SetupCloseFileQueue
SetupDiGetDriverInstallParamsW
CM_Get_Res_Des_Data_Size_Ex
Sections
.text Size: 219KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ