z:\SM\Project\SmartPanel\SOURCE\Caller64\x64\release\Caller64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7460a492eec81d3ff7d0b9d0cda7ad98_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7460a492eec81d3ff7d0b9d0cda7ad98_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7460a492eec81d3ff7d0b9d0cda7ad98_JaffaCakes118
-
Size
306KB
-
MD5
7460a492eec81d3ff7d0b9d0cda7ad98
-
SHA1
bc07d9adaf0d41da1797117687fe287da72121ee
-
SHA256
85f4715ee748efac042d3dda901d39c539d02b7e592e62a2501547c0a7da0b10
-
SHA512
efff610fd364467c49802f044d842951d47f9d6578ee48869a136beccb9fa905789adcec7d4ae63486a24ba34a64beafa6356131d4f75897700680984a6c12c7
-
SSDEEP
6144:83Ugta7QHZ9tRXP/yQ8yfLnzkOnC/77iU3+86oEP9:KUInHZl//YcLnzow81EP9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7460a492eec81d3ff7d0b9d0cda7ad98_JaffaCakes118
Files
-
7460a492eec81d3ff7d0b9d0cda7ad98_JaffaCakes118.exe windows:5 windows x64 arch:x64
4c854fecf847a37f4b6fde33fa672578
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
HeapAlloc
HeapFree
RtlLookupFunctionEntry
RtlUnwindEx
Sleep
RaiseException
RtlPcToFileHeader
HeapQueryInformation
HeapReAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetStartupInfoA
SetHandleCount
GetFileType
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCommandLineA
GetModuleHandleW
SetErrorMode
CreateFileA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
GetOEMCP
GetCPInfo
FormatMessageA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalFree
LocalAlloc
GlobalFlags
GlobalFree
WritePrivateProfileStringA
lstrlenA
GlobalUnlock
GetCurrentProcessId
CloseHandle
GetModuleFileNameW
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetLastError
MultiByteToWideChar
lstrcmpW
GetVersionExA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
WideCharToMultiByte
CompareStringA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalLock
lstrcmpA
GlobalAlloc
GetModuleHandleA
ExpandEnvironmentStringsA
ExitProcess
CreateProcessA
FreeLibrary
GetProcAddress
LoadLibraryA
GetEnvironmentStringsW
GetLastError
user32
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
SetWindowTextA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
ReleaseCapture
LoadAcceleratorsA
InvalidateRect
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
ShowWindow
TranslateAcceleratorA
GetWindowThreadProcessId
IsWindowEnabled
ShowOwnedPopups
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
CheckMenuItem
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
FindWindowA
LoadIconA
LoadCursorA
GetDesktopWindow
GetKeyState
SetMenu
EnableWindow
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetSubMenu
UnregisterClassA
GetSysColorBrush
GetMenuItemInfoA
InflateRect
GetCursorPos
PostQuitMessage
PostMessageA
GetWindow
GetSystemMetrics
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongA
GetWindowLongA
GetMenu
CallWindowProcA
DefWindowProcA
SendMessageA
GetDlgCtrlID
PtInRect
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
ScreenToClient
EqualRect
DeferWindowPos
CopyRect
EnableMenuItem
gdi32
DeleteDC
CreatePatternBrush
GetStockObject
GetDeviceCaps
CreateSolidBrush
CreateFontIndirectA
GetTextExtentPoint32A
TextOutA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
RectVisible
PtVisible
GetPixel
BitBlt
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
ExtTextOutA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
DragFinish
DragQueryFileA
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 46KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE