g:\Acro_root_ns\BuildResults\bin\release\Eula.pdb
Static task
static1
Behavioral task
behavioral1
Sample
74b9f2e0f8e09206ce9946c14a45d020_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
74b9f2e0f8e09206ce9946c14a45d020_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
74b9f2e0f8e09206ce9946c14a45d020_JaffaCakes118
-
Size
225KB
-
MD5
74b9f2e0f8e09206ce9946c14a45d020
-
SHA1
a77fc0f75849e4769914a2cbb2e8951ed427ab59
-
SHA256
92cf02be0342c82d893aa4a3e6c5c318663377ca05a78af48750726bed2426a5
-
SHA512
d8937993b1b1b1819122fccca50db9c77c21644f07550ee4436ae641a6f9c81bc0dced84b8ce651745a87a7b54ab7ffc82d63b3f06377577330027dd7f0ed88a
-
SSDEEP
1536:7R8Bftg+9t/p4QAILJ6COPdvX/ZWOtnGWPW:2vgmJAIlEPxX/ZWOFr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74b9f2e0f8e09206ce9946c14a45d020_JaffaCakes118
Files
-
74b9f2e0f8e09206ce9946c14a45d020_JaffaCakes118.exe windows:4 windows x86 arch:x86
9180d04a61089bb479a991c3864ab3e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedDecrement
SetEvent
GetLastError
CopyFileW
GetPrivateProfileStringW
MultiByteToWideChar
lstrlenA
SetLastError
LockResource
LoadResource
GetModuleFileNameW
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalHandle
GetPrivateProfileIntW
lstrcpynW
GetFullPathNameW
HeapAlloc
InterlockedIncrement
HeapFree
InterlockedCompareExchange
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
Sleep
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleW
GlobalAlloc
GetCurrentProcess
FlushInstructionCache
lstrcpyW
GetSystemTimeAsFileTime
lstrlenW
lstrcatW
FindFirstFileW
FindClose
FindResourceW
DeleteCriticalSection
InitializeCriticalSection
RaiseException
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
GetProcAddress
user32
SendDlgItemMessageW
SetDlgItemTextW
GetWindow
GetDlgItem
SetWindowContextHelpId
SendMessageW
MapDialogRect
EndDialog
DestroyWindow
CreateWindowExW
GetWindowTextW
GetSysColor
MoveWindow
GetClientRect
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
UnregisterClassA
RedrawWindow
SetCapture
IsChild
GetParent
GetClassNameW
CharNextW
ReleaseCapture
FillRect
CallWindowProcW
EndPaint
BeginPaint
GetActiveWindow
DialogBoxIndirectParamW
RegisterWindowMessageW
GetWindowTextLengthW
CreateAcceleratorTableW
RegisterClassExW
LoadCursorW
GetClassInfoExW
DestroyAcceleratorTable
IsWindow
SetFocus
GetFocus
GetDlgItemTextW
EnableWindow
IsWindowEnabled
SetWindowPos
SetWindowTextW
PostThreadMessageW
DefWindowProcW
GetWindowLongW
SetWindowLongW
GetDesktopWindow
gdi32
CreateSolidBrush
BitBlt
GetStockObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
GetObjectW
DeleteDC
GetDeviceCaps
comdlg32
GetSaveFileNameW
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
ole32
OleInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleLockRunning
StringFromGUID2
CoCreateInstance
CoUninitialize
CoInitialize
CoGetClassObject
oleaut32
SysFreeString
SysStringLen
SysAllocStringLen
SysAllocString
VariantInit
VariantClear
DispCallFunc
LoadRegTypeLi
LoadTypeLi
SysStringByteLen
OleCreateFontIndirect
msvcr80
_controlfp_s
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
_except_handler4_common
?terminate@@YAXXZ
_wtoi64
malloc
swprintf_s
??2@YAPAXI@Z
calloc
??_U@YAPAXI@Z
_recalloc
__CxxFrameHandler3
memset
wcscspn
wcsncpy_s
memcpy_s
_CxxThrowException
free
??_V@YAXPAX@Z
??3@YAXPAX@Z
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE