c:\Documents and Settings\rakesh\Desktop\dsa\selfextractor\Self Extractor New\ExtractorFinalUI\Release\SelfExtractor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8569b9b689ec571b1f13436927395235_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8569b9b689ec571b1f13436927395235_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8569b9b689ec571b1f13436927395235_JaffaCakes118
-
Size
2.1MB
-
MD5
8569b9b689ec571b1f13436927395235
-
SHA1
4f937dd15d6beb185fc670e2cc4801fc94a7a844
-
SHA256
942a745a78c1494f7a185cf31b05dfa01453ac3e6e10c780a608afe329305101
-
SHA512
573d96cccc5bf2dc45c0458fff2226875eb830772821a4b4ca3257bc159fbcb28e1b41e8afa751c2ccbc0bb60d1b3e612511baaaf8f3130617c12832ba2fbb9a
-
SSDEEP
49152:VvkQpas6QdksJSOMxAdGXK9EcYbfiNwUNiBVkhLi46jkL0J5Dn:hjSxAdxAiVNinAe4FL0j7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8569b9b689ec571b1f13436927395235_JaffaCakes118
Files
-
8569b9b689ec571b1f13436927395235_JaffaCakes118.exe windows:5 windows x86 arch:x86
3cd4522f4de7ff3efdc2f6a44965fcdb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FileTimeToLocalFileTime
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetEnvironmentVariableA
CreateFileA
GetProcessHeap
GetTimeZoneInformation
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapReAlloc
HeapSize
HeapAlloc
VirtualFree
HeapFree
HeapCreate
HeapDestroy
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
SetHandleCount
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetCPInfo
GetOEMCP
GetACP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemInfo
VirtualAlloc
OutputDebugStringW
GetFileType
WriteConsoleW
OutputDebugStringA
GetStdHandle
DebugBreak
GetModuleFileNameA
RaiseException
RtlUnwind
IsBadReadPtr
HeapValidate
ExitProcess
Sleep
GetFileTime
GetFileSizeEx
GetFileAttributesW
FileTimeToSystemTime
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedIncrement
CompareStringA
InterlockedExchange
GetCurrentThread
lstrlenA
lstrcmpA
GetCurrentProcessId
InterlockedDecrement
GetAtomNameW
GetModuleHandleA
SetEvent
GlobalFlags
GetModuleFileNameW
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetFileSize
SetEndOfFile
UnlockFile
LockFile
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileW
GetCurrentProcess
DuplicateHandle
GlobalAlloc
FormatMessageW
LocalFree
lstrlenW
CompareStringW
LoadLibraryA
GetProcAddress
SetLastError
lstrcmpW
GetCurrentThreadId
GlobalGetAtomNameW
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
MultiByteToWideChar
GetModuleHandleW
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
WideCharToMultiByte
CreateProcessW
DeleteFileW
RemoveDirectoryW
CopyFileW
LockResource
CreateDirectoryW
GetEnvironmentVariableW
LoadLibraryW
FreeLibrary
SizeofResource
LoadResource
FindResourceW
GetLastError
OpenEventA
user32
GetMenuItemID
SetWindowTextW
GetMenuCheckMarkDimensions
LoadBitmapW
SetMenuItemBitmaps
RegisterWindowMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
PeekMessageW
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
WinHelpW
TrackPopupMenu
GetWindowTextW
GetKeyState
GetDlgCtrlID
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
UnhookWindowsHookEx
GetPropW
CallWindowProcW
RemovePropW
DefWindowProcW
SetMenu
GetMenu
GetMessageTime
GetMessagePos
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
TabbedTextOutW
LoadIconW
LoadCursorW
GetForegroundWindow
SetForegroundWindow
GetParent
GetLastActivePopup
GetWindow
GetTopWindow
GetFocus
GetCapture
ShowOwnedPopups
IsWindowVisible
ValidateRect
InvalidateRect
UpdateWindow
ReleaseDC
GetWindowDC
GetDC
ScreenToClient
ClientToScreen
MapWindowPoints
GetClientRect
BringWindowToTop
IsIconic
PostMessageW
GetDesktopWindow
GetActiveWindow
GetMessageW
DispatchMessageW
SetActiveWindow
IsWindow
EnableWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
DestroyWindow
TranslateMessage
IsDialogMessageW
ShowWindow
SetWindowLongW
CreateDialogParamW
MoveWindow
GetSystemMetrics
GetMenuState
GetSubMenu
GetMenuItemCount
IsMenu
CharUpperW
GetSysColorBrush
FillRect
InflateRect
PtInRect
MessageBoxA
MessageBoxW
GetDlgItemTextW
PostQuitMessage
SendMessageW
GetWindowRect
DrawTextW
DrawTextExW
GrayStringW
CreatePopupMenu
CheckMenuItem
EnableMenuItem
GetMenuItemInfoW
InsertMenuItemW
ModifyMenuW
LoadMenuW
GetWindowThreadProcessId
DestroyMenu
SystemParametersInfoW
SetRectEmpty
SetCursor
ReleaseCapture
GetClipboardFormatNameA
GetClipboardFormatNameW
UnpackDDElParam
LoadAcceleratorsW
TranslateAcceleratorW
ReuseDDElParam
gdi32
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetObjectType
CreateSolidBrush
CreatePatternBrush
CreateFontIndirectW
CreateCompatibleBitmap
GetStockObject
CreateCompatibleDC
PtVisible
RectVisible
BitBlt
GetPixel
TextOutW
GetTextExtentPoint32W
Escape
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
ExtTextOutW
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
OpenThreadToken
SetThreadToken
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RevertToSelf
shell32
SHGetPathFromIDListW
DragFinish
DragQueryFileW
SHBrowseForFolderW
shlwapi
PathStripToRootW
PathFindFileNameW
PathIsUNCW
ole32
StringFromCLSID
CoTaskMemFree
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 407KB - Virtual size: 406KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ