c:\Work\Beemp3Installer_newFB\Release\inst_2003.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6f26005310ef0e532e6d5f65b943d0dd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f26005310ef0e532e6d5f65b943d0dd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f26005310ef0e532e6d5f65b943d0dd_JaffaCakes118
-
Size
2.0MB
-
MD5
6f26005310ef0e532e6d5f65b943d0dd
-
SHA1
d4e8d5fd4d7a575db6314dd7d104c8fd2e020fa7
-
SHA256
41c11f9ae9f2ba67fd3bf3865b9506ad173bba77096f94ab97fe7da89e8c2716
-
SHA512
f3d6609330a75b2a23df7f5b832187d8e7449a8ff5f1fc2ab8a4bb7457b612984b7dca1e80727b0b4d4f2d8f16bc644716507ca2fb6bf4bd3ac2b52e61d23b72
-
SSDEEP
49152:9No0bvugqzNr5bzyskTr7k5adO/cnpgdGLwNKAMBy:Y0yHr5bOZcipekeyM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f26005310ef0e532e6d5f65b943d0dd_JaffaCakes118
Files
-
6f26005310ef0e532e6d5f65b943d0dd_JaffaCakes118.exe windows:4 windows x86 arch:x86
fffe3eb7c54f32ac021e190567070b4b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WritePrivateProfileStringW
SetErrorMode
GetTickCount
GetProcessHeap
GetStartupInfoW
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitThread
CreateThread
ExitProcess
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileTime
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GetFileAttributesW
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetCurrentProcessId
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetThreadLocale
MoveFileW
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
MulDiv
FreeResource
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
CompareStringW
lstrcmpW
GetVersionExA
TerminateProcess
FindFirstFileW
FindNextFileW
DeleteFileW
FindClose
RemoveDirectoryW
HeapAlloc
HeapFree
SetLastError
LoadLibraryA
ReadFile
WaitNamedPipeW
SetNamedPipeHandleState
GetUserDefaultLCID
GetCurrentProcess
GetVersionExW
GetLastError
GetModuleFileNameW
CopyFileW
Sleep
CreateDirectoryW
lstrlenA
lstrlenW
SetEvent
ResumeThread
WaitForSingleObject
TerminateThread
ResetEvent
CreateEventW
GetProcAddress
FreeLibrary
SetThreadLocale
GetModuleHandleW
CreateFileW
WriteFile
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetStartupInfoA
MultiByteToWideChar
user32
PostThreadMessageW
SetRect
IsRectEmpty
CopyAcceleratorTableW
CharNextW
ReleaseCapture
SetCapture
UnregisterClassW
GetSysColorBrush
DestroyMenu
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
CharUpperW
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
EnableMenuItem
CheckMenuItem
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextW
TabbedTextOutW
GetMenuState
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetParent
ScreenToClient
EqualRect
RegisterClipboardFormatW
MessageBeep
GetNextDlgGroupItem
DrawTextExW
InvalidateRgn
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetWindowLongW
SetWindowLongW
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
EnumWindows
GetWindowThreadProcessId
GetSystemMetrics
IsIconic
DrawIcon
PostQuitMessage
GetClientRect
LoadBitmapW
MessageBoxW
LoadIconW
InvalidateRect
IsWindow
PostMessageW
LoadCursorW
GetSysColor
EnableWindow
GetWindowRect
SendMessageW
SetCursor
GetCapture
UnregisterClassA
gdi32
CreateBitmap
GetStockObject
CreateSolidBrush
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetWindowExtEx
GetViewportExtEx
DeleteObject
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
CreatePen
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
SelectObject
DeleteDC
Rectangle
GetObjectW
CreateFontIndirectW
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
SetSecurityDescriptorDacl
RegQueryValueExW
RegQueryValueW
RegEnumKeyW
RegOpenKeyW
RegDeleteValueW
InitializeSecurityDescriptor
RegSetValueExW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
comctl32
_TrackMouseEvent
ord17
shlwapi
PathFindExtensionW
PathStripToRootW
PathIsUNCW
SHDeleteKeyW
PathFindFileNameW
oledlg
OleUIBusyW
ole32
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysFreeString
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
wininet
HttpOpenRequestW
InternetConnectW
HttpSendRequestExW
HttpEndRequestW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
HttpAddRequestHeadersW
InternetQueryDataAvailable
InternetSetOptionExW
Sections
.text Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ