D:\Project Files\Winter\Tools\AdBalloonExt\Run\AdBalloonExt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
84e857dd5b96fde65db2ff78c2d0b97b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
84e857dd5b96fde65db2ff78c2d0b97b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84e857dd5b96fde65db2ff78c2d0b97b_JaffaCakes118
-
Size
80KB
-
MD5
84e857dd5b96fde65db2ff78c2d0b97b
-
SHA1
2cde061ec57b1cf23124e1a39e9b59b163c70354
-
SHA256
912cce5e4a5a91fb222aadb0fd9cc44d8c8b8ee633574fb30e53443384ba7441
-
SHA512
c5fd766ba0dd85839f53c0a8cd752a0e7c91d2e6c0cb126a5532856709ffe47945d31a3bd02414a3b7e44c4cbc6cb8a30e27ad0f7409d8f772efc8df10b8dd14
-
SSDEEP
1536:8U/ey7HP3Ppq7HcKmQsJCx8fLMMMm1zxVJqvMmbMMMqlDp:8U/1xq7BtsJC+MMMmPbqPbMMM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84e857dd5b96fde65db2ff78c2d0b97b_JaffaCakes118
Files
-
84e857dd5b96fde65db2ff78c2d0b97b_JaffaCakes118.exe windows:4 windows x86 arch:x86
c7e89bc0e65eab638a0777c87e61c30f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
GetWindowRect
GetDesktopWindow
GetSystemMetrics
IsWindowVisible
GetClientRect
SendMessageA
GetKeyState
SetFocus
EndPaint
BeginPaint
GetWindowLongA
SetRect
SetWindowLongA
RegisterClassA
LoadCursorA
TranslateMessage
DispatchMessageA
LoadIconA
PostQuitMessage
SetTimer
DefWindowProcA
KillTimer
DestroyWindow
RegisterClassExA
ole32
CoCreateInstance
OleRun
OleInitialize
OleUninitialize
CoInitialize
kernel32
GetSystemInfo
VirtualProtect
LocalFree
GetLastError
lstrlenW
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
OutputDebugStringA
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualQuery
HeapAlloc
VirtualAlloc
HeapReAlloc
IsBadWritePtr
HeapSize
GetOEMCP
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
LoadLibraryA
LCMapStringA
LCMapStringW
GetCPInfo
gdi32
GetStockObject
oleaut32
SysFreeString
SysAllocStringLen
SysAllocString
SafeArrayDestroy
VariantInit
VariantClear
GetErrorInfo
SafeArrayCreate
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ