C:\Projects\searchqu\output\MinSizeRel\searchqu_it.pdb
Static task
static1
Behavioral task
behavioral1
Sample
731f2eb6de26da2efb2f8fc42e6af2d1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
731f2eb6de26da2efb2f8fc42e6af2d1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
731f2eb6de26da2efb2f8fc42e6af2d1_JaffaCakes118
-
Size
1.3MB
-
MD5
731f2eb6de26da2efb2f8fc42e6af2d1
-
SHA1
ce11064f2bdd8591b3e83d1c438896e6fbce6113
-
SHA256
799f45c180f7d44741d862ac25927427d9066b9db71d2d7c9e14dbcabb9382a7
-
SHA512
ebbc73c60b8892be6f2736c7c341be90be7f82d8d3d253e857855fd04fc2337b98d2f6c3da82b8d9368a5e3b8dc41a23405989bdf927db424ef38b9fd08a2df7
-
SSDEEP
24576:cCcJR93glh3n1hlMLfbNIDFgBaiNPYr9dC3Y:cja31hlMLiDFgBHC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 731f2eb6de26da2efb2f8fc42e6af2d1_JaffaCakes118
Files
-
731f2eb6de26da2efb2f8fc42e6af2d1_JaffaCakes118.exe windows:5 windows x86 arch:x86
4770d79268211298c6607873895ad427
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
SHGetValueW
PathRemoveArgsW
PathStripPathW
PathRemoveExtensionW
PathMakePrettyW
wininet
DeleteUrlCacheEntryW
FindNextUrlCacheEntryW
FindCloseUrlCache
FindFirstUrlCacheEntryW
SetUrlCacheEntryInfoW
pdh
PdhCollectQueryData
PdhGetFormattedCounterValue
PdhRemoveCounter
PdhCloseQuery
PdhLookupPerfNameByIndexA
PdhOpenQueryW
PdhAddCounterA
PdhMakeCounterPathA
kernel32
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
ReadFile
GetFileSize
GetFileInformationByHandle
InitializeCriticalSection
ExitThread
CreateThread
CloseHandle
WriteFile
CreateFileA
LockResource
LoadResource
SizeofResource
FindResourceW
DeleteFileA
GetTempFileNameA
GetTempPathA
Sleep
InterlockedExchangeAdd
HeapFree
GetProcessHeap
WaitForSingleObject
CreateEventA
CreateSemaphoreA
DuplicateHandle
GetCurrentProcess
HeapAlloc
SetEvent
LocalFree
FormatMessageA
GetLastError
FlushInstructionCache
InterlockedDecrement
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
SystemTimeToFileTime
GetSystemTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetVersionExW
RtlUnwind
RaiseException
GetStartupInfoW
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetStdHandle
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
GetModuleHandleA
WriteConsoleW
LoadLibraryA
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedCompareExchange
IsProcessorFeaturePresent
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
VirtualFreeEx
ReleaseSemaphore
GetSystemInfo
ResetEvent
ResumeThread
WaitForMultipleObjects
SetWaitableTimer
CreateWaitableTimerA
CreateProcessW
GetWindowsDirectoryW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
IsDebuggerPresent
GetTimeZoneInformation
user32
CreateDesktopW
GetThreadDesktop
SetThreadDesktop
CloseDesktop
IsWindow
PostMessageW
VkKeyScanW
MapVirtualKeyW
GetWindowLongW
SetWindowLongW
DefWindowProcW
GetClientRect
SendMessageW
PtInRect
GetWindowThreadProcessId
CallWindowProcW
shell32
ord680
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysFreeString
SysAllocString
advapi32
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyExW
OpenProcessToken
Sections
.text Size: 334KB - Virtual size: 334KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
STLPORT_ Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 855KB - Virtual size: 854KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ