f:\_JOB_\_PROGRESS_\vaccine\VirusBye All\Virus2ByeUp\Virus2ByeUp\Release\Virus2ByeUp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
878b580f8c4e0b8817e9fc82d3222845_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
878b580f8c4e0b8817e9fc82d3222845_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
878b580f8c4e0b8817e9fc82d3222845_JaffaCakes118
-
Size
416KB
-
MD5
878b580f8c4e0b8817e9fc82d3222845
-
SHA1
097779da1e73ffee6dce999ceb0d193a5eb3024c
-
SHA256
4da1968045303606a0f21ece178ab6d42b58e9f80065ec5da131b8b8834c207a
-
SHA512
6a0a0b6de78138a193958ecd9cd83ebbe81cf62e2c417b6afa6a25f85ac9b26b6c80f7dc3d32bc0acc4deef5d4f587f20b0aa6f51b5a7c1df6ab144cc7489842
-
SSDEEP
6144:4hbnz7ksGp0oBH/ygRRsZuTbVK8Q9neABUeFE/t+DozX:InzYsG0kfywsyQ9ndEF+DoT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 878b580f8c4e0b8817e9fc82d3222845_JaffaCakes118
Files
-
878b580f8c4e0b8817e9fc82d3222845_JaffaCakes118.exe windows:4 windows x86 arch:x86
80683fcc4c3a73983b80a5e0fdaf8f74
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesA
GetFileTime
SetErrorMode
GetTickCount
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
RtlUnwind
ExitThread
CreateThread
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
GetOEMCP
IsBadWritePtr
QueryPerformanceCounter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GetCPInfo
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GlobalFlags
InterlockedIncrement
WritePrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
FreeResource
GlobalAddAtomA
InterlockedDecrement
SetLastError
MulDiv
FormatMessageA
lstrcpynA
LocalFree
GetCurrentThread
GetCurrentThreadId
GlobalDeleteAtom
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GetModuleHandleA
HeapAlloc
HeapFree
LoadLibraryA
GetProcAddress
FreeLibrary
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
GetPriorityClass
GetExitCodeProcess
TerminateProcess
CreateMutexA
ReleaseMutex
CreateDirectoryA
FindFirstFileA
FindClose
GetTempPathA
GetCurrentProcessId
WaitForSingleObject
TerminateThread
CloseHandle
ResumeThread
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
DeleteFileA
CopyFileA
GetModuleFileNameA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
VirtualFree
Sleep
user32
PostThreadMessageA
wsprintfA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
EndPaint
BeginPaint
GrayStringA
DrawTextExA
TabbedTextOutA
GetDesktopWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
GetWindowTextLengthA
GetWindowTextA
SetWindowPos
SetFocus
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
RegisterClipboardFormatA
GetDlgItem
GetWindow
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
ValidateRect
MessageBoxA
IsWindowEnabled
UnhookWindowsHookEx
GetMenuState
GetMenuItemCount
ShowWindow
OffsetRect
GetNextDlgGroupItem
ClientToScreen
WindowFromPoint
GetCapture
ReleaseCapture
SetCursor
DrawTextA
GetWindowDC
GetClassNameA
GetCursorPos
SetForegroundWindow
SetActiveWindow
GetSubMenu
GetMenuItemID
SystemParametersInfoA
LoadCursorA
MessageBeep
InvalidateRgn
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
KillTimer
LoadBitmapA
GetWindowLongA
GetSysColor
GetParent
SetCapture
DestroyMenu
SendDlgItemMessageA
InvalidateRect
ReleaseDC
GetDC
DrawFocusRect
DrawEdge
SetRect
PtInRect
IsRectEmpty
CopyRect
GetLastActivePopup
FindWindowA
BringWindowToTop
RegisterWindowMessageA
IsWindow
PostMessageA
ScreenToClient
GetSystemMetrics
EnableWindow
LoadIconA
GetClientRect
GetWindowRect
IsIconic
SendMessageA
DrawIcon
PostQuitMessage
UnregisterClassA
CharUpperA
gdi32
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectA
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
StretchBlt
DeleteObject
GetStockObject
SelectObject
CreateCompatibleBitmap
BitBlt
CreateCompatibleDC
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
RegCloseKey
shell32
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
_TrackMouseEvent
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CLSIDFromString
CoRegisterMessageFilter
OleIsCurrentClipboard
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
OleFlushClipboard
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
oleaut32
OleCreateFontIndirect
SysAllocString
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysAllocStringByteLen
SysStringLen
SystemTimeToVariantTime
SysFreeString
urlmon
URLDownloadToFileA
gdiplus
GdiplusStartup
GdipCloneImage
GdipCreateHBITMAPFromBitmap
GdipFree
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipDisposeImage
GdipAlloc
GdiplusShutdown
wininet
InternetQueryDataAvailable
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetCheckConnectionA
InternetGetConnectedState
HttpQueryInfoA
InternetCrackUrlA
DeleteUrlCacheEntry
psapi
GetModuleFileNameExA
Sections
.text Size: 184KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ