T:\final project backup\uploader version backup\fud all(eset,microsoft,avg)\with icon +shortcut link\HangOver 1.5.3 (Startup)\Release\Http_t.pdb
Static task
static1
Behavioral task
behavioral1
Sample
731adaf044f0f0fa35b99b4a60184b14_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
731adaf044f0f0fa35b99b4a60184b14_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
731adaf044f0f0fa35b99b4a60184b14_JaffaCakes118
-
Size
308KB
-
MD5
731adaf044f0f0fa35b99b4a60184b14
-
SHA1
579b44535a1f627092349d35d550eb073d80d438
-
SHA256
e9f86117cc4c96966edb8fad6947f4a33652df3e94ecc8cab7ada45ae7f9f1c0
-
SHA512
8964c6674480fe05e571eb1af322317172c4f323ced5789ae6ed09e68de0904c8d32e417c5b2393ed04422ebb6d1d41282e67676609d1fe28232888ee4e50284
-
SSDEEP
3072:/1RCas9LLxn+eAEyRETS44eGtcseoFYAkbnZc4CgKNh2+ryIcAmzvc/q5EQ+0de:MgGyme9eGtQoFYA2Zc4CFryMMcTd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 731adaf044f0f0fa35b99b4a60184b14_JaffaCakes118
Files
-
731adaf044f0f0fa35b99b4a60184b14_JaffaCakes118.exe windows:5 windows x86 arch:x86
0b6d36d6997f231a830afa6107f64bb6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateMutexA
lstrlenA
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
SetLastError
GetLastError
LoadLibraryA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
OpenMutexA
GetProcAddress
FileTimeToLocalFileTime
FreeLibrary
LocalAlloc
CompareStringA
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
GetCurrentProcessId
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalGetAtomNameA
lstrcmpA
GetFileAttributesA
GetFileSizeEx
GetFileTime
WaitForSingleObject
GlobalAddAtomA
GlobalFlags
GetCurrentThreadId
GetVersionExA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetCurrentDirectoryA
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
ExitProcess
HeapCreate
VirtualFree
SetHandleCount
GetStdHandle
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
MultiByteToWideChar
CreateThread
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileA
GetModuleFileNameA
FileTimeToSystemTime
FindClose
FindNextFileA
FindFirstFileA
GetComputerNameA
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
ExpandEnvironmentStringsA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
Sleep
CreateFileW
user32
SetForegroundWindow
SetMenu
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
RegisterWindowMessageA
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
GetWindowTextA
GetClientRect
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
CharUpperA
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CopyRect
CallWindowProcA
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
SetWindowsHookExA
CallNextHookEx
GetKeyState
PeekMessageA
ValidateRect
PostMessageA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetWindowThreadProcessId
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
PostQuitMessage
SetWindowTextA
LoadStringA
FindWindowA
SendMessageA
EndPaint
BeginPaint
DefWindowProcA
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
CoUninitialize
CoInitialize
CoCreateInstance
shlwapi
PathStripToRootA
PathFindFileNameA
PathIsUNCA
wininet
HttpOpenRequestA
InternetConnectA
HttpSendRequestExA
HttpEndRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpAddRequestHeadersA
InternetQueryDataAvailable
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comdlg32
GetFileTitleA
oleaut32
VariantInit
VariantClear
VariantChangeType
Sections
.text Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ