e:\work\lothar\dev\trunk\virteva\virteva\Release_Free\virteva.pdb
Static task
static1
Behavioral task
behavioral1
Sample
74acc6aaf2ada263e66cbc168aed3e4b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
74acc6aaf2ada263e66cbc168aed3e4b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
74acc6aaf2ada263e66cbc168aed3e4b_JaffaCakes118
-
Size
3.7MB
-
MD5
74acc6aaf2ada263e66cbc168aed3e4b
-
SHA1
216b23b3483b6ca8379e64adf9c3b6d3a9c1cd68
-
SHA256
3e1e2a34458ca855ededa2ca63e693e5a0bd9c0065ab32a903f9e1cabf2486fa
-
SHA512
07cc9abb39b628c09fdff11f13bf40354817516fe579490c861b2c79e960e53c5bf8e7f53c5d1caee89f74f4c76e0f4d645387324e9eedfc708c41b983cc7d90
-
SSDEEP
49152:81+7smpMj4QOiLgNxLS8yEPO29vWHtPebvasMGDd7JaUlD8ar:84Imo4QOisN0RWOlHtQO8d7JaUl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74acc6aaf2ada263e66cbc168aed3e4b_JaffaCakes118
Files
-
74acc6aaf2ada263e66cbc168aed3e4b_JaffaCakes118.exe windows:5 windows x86 arch:x86
c19e5595c20e8df654f4c8772ae785c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdiplus
GdipCloneImage
GdipDeleteGraphics
GdipCreateFont
GdipGetGenericFontFamilySansSerif
GdipDeleteFontFamily
GdiplusStartup
GdipDrawImageRectRect
GdipSetImageAttributesColorKeys
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipDrawImageRect
GdipGetImageDimension
GdipCreateBitmapFromStreamICM
GdipCreateFromHDC
GdipDisposeImage
GdipDrawString
GdipCloneBrush
GdipAlloc
GdipFree
GdipDeleteBrush
GdipCreateSolidFill
GdipDeleteFont
GdipCreateFontFamilyFromName
kernel32
FillConsoleOutputAttribute
SetConsoleCursorPosition
WriteConsoleW
GetTickCount
CreateFileA
CloseHandle
MulDiv
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FindResourceW
LoadResource
SizeofResource
LockResource
SetLastError
WriteFile
SetFilePointer
MapViewOfFile
GetFileSize
UnmapViewOfFile
FindFirstFileW
InterlockedIncrement
InterlockedDecrement
CreateDirectoryW
InitializeCriticalSection
LoadLibraryW
LeaveCriticalSection
GetModuleFileNameW
CreateFileW
FlushFileBuffers
EnterCriticalSection
FindClose
RemoveDirectoryW
GetModuleHandleA
FindNextFileW
DeleteCriticalSection
DeleteFileW
SetFileAttributesW
ExpandEnvironmentStringsW
GetCurrentThreadId
FreeLibrary
WaitForSingleObject
SetEvent
ConnectNamedPipe
CreateNamedPipeW
WaitNamedPipeW
CreateEventA
FormatMessageW
DisconnectNamedPipe
ResetEvent
LoadLibraryA
CreateEventW
FillConsoleOutputCharacterW
GetWindowsDirectoryW
LocalFree
CreateThread
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateFileMappingW
OpenFileMappingW
CreateMutexW
InterlockedCompareExchange
WaitForSingleObjectEx
ReleaseMutex
WideCharToMultiByte
WaitForMultipleObjects
_llseek
_lclose
GetFullPathNameW
CopyFileW
GetFileAttributesW
GetEnvironmentVariableW
SetEndOfFile
GetShortPathNameW
GetCurrentDirectoryW
ReadFile
LoadLibraryExW
MoveFileW
GetVersionExA
FindFirstFileExW
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetModuleFileNameA
HeapCreate
VirtualAlloc
VirtualFree
HeapSize
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStringTypeW
LCMapStringW
LCMapStringA
GetConsoleScreenBufferInfo
GetStdHandle
AttachConsole
GetLastError
SetEnvironmentVariableW
GetProcAddress
GetModuleHandleW
GetSystemTimeAsFileTime
Sleep
ResumeThread
GetCurrentProcessId
TerminateProcess
CreateProcessW
ExitProcess
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
SetStdHandle
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
VirtualQuery
VirtualProtect
FlushInstructionCache
GetThreadContext
SetThreadContext
SuspendThread
ReadProcessMemory
VirtualQueryEx
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
GetConsoleCP
GetConsoleMode
GetStringTypeA
SetNamedPipeHandleState
GetFileAttributesExW
GetCPInfo
RtlUnwind
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
RaiseException
GetTimeZoneInformation
HeapReAlloc
GetStartupInfoW
HeapAlloc
IsDebuggerPresent
InterlockedExchange
MultiByteToWideChar
lstrlenA
HeapFree
GetProcessHeap
UnhandledExceptionFilter
SetUnhandledExceptionFilter
user32
KillTimer
PeekMessageW
SetLayeredWindowAttributes
CreateWindowExW
GetDesktopWindow
BeginPaint
RegisterClassExW
LoadCursorW
wsprintfW
InvalidateRect
DefWindowProcW
UpdateWindow
IsWindow
DestroyWindow
SetTimer
DispatchMessageW
TranslateMessage
GetMessageW
MessageBoxW
EndPaint
ShowWindow
DrawTextW
GetWindowRect
gdi32
SetDCPenColor
SetDCBrushColor
GetStockObject
SetBkMode
SetTextColor
DeleteObject
GetTextExtentPoint32W
SelectObject
CreateFontIndirectW
GetDeviceCaps
Rectangle
advapi32
RegEnumValueW
EnumServicesStatusExW
QueryServiceConfigW
ControlService
GetServiceDisplayNameW
QueryServiceStatusEx
SetServiceStatus
ChangeServiceConfigW
QueryServiceStatus
StartServiceW
ChangeServiceConfig2W
QueryServiceConfig2W
OpenServiceW
EnumDependentServicesW
OpenSCManagerW
DeleteService
CloseServiceHandle
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegOpenKeyW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
shell32
SHGetFolderPathW
ole32
CoCreateInstance
CoInitialize
OleRun
CreateStreamOnHGlobal
oleaut32
SysFreeString
VariantClear
SysAllocString
GetErrorInfo
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ