f:\thestar\sources\source\OffLinePatch_NewTest\OffLinePatch\Release\Patcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8c509bbb8e8c2c442cb984e34b797bf6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8c509bbb8e8c2c442cb984e34b797bf6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c509bbb8e8c2c442cb984e34b797bf6_JaffaCakes118
-
Size
5.4MB
-
MD5
8c509bbb8e8c2c442cb984e34b797bf6
-
SHA1
c17bea5616e2490c98152b20baf6e8dc824c92ac
-
SHA256
76ff361d1a6df9aed3616a552e417eab0ba97eb6c7fa54a640902afc29ffe085
-
SHA512
a7c4754386b483d246992e027d5d0fa819974be6c7db188fc8c59a4db75f3cd6a896f4c3dd8b62df330a00ffb3085a827c1cc3a28cd15cc63df2355ee35d23b5
-
SSDEEP
98304:GCuiX8RjNK8BSGVYWwhOIl7qjptVTcTcTcTcTZ:/u8aj+GV1qOIl6TcTcTcTcTZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c509bbb8e8c2c442cb984e34b797bf6_JaffaCakes118
Files
-
8c509bbb8e8c2c442cb984e34b797bf6_JaffaCakes118.exe windows:4 windows x86 arch:x86
695edf1f052c99cab4474751358b2eab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCPInfo
GetOEMCP
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetTickCount
HeapAlloc
HeapFree
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
CreateThread
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
GetFullPathNameA
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetTimeZoneInformation
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
GetACP
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetThreadLocale
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GlobalFlags
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetModuleFileNameW
WritePrivateProfileStringA
FreeResource
GetCurrentProcessId
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
lstrcmpA
FreeLibrary
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
SetLastError
MoveFileA
GetFileSize
CopyFileA
DeleteFileA
RemoveDirectoryA
MoveFileExA
FormatMessageA
LocalFree
GetFileTime
WriteFile
SetFileTime
GetCurrentDirectoryA
GetFileAttributesA
CreateDirectoryA
LocalFileTimeToFileTime
SystemTimeToFileTime
ReadFile
CreateFileA
SetFilePointer
OutputDebugStringA
CreateToolhelp32Snapshot
Process32First
Process32Next
ResumeThread
SetEvent
Sleep
SetThreadPriority
ExitThread
GetExitCodeThread
TerminateThread
SuspendThread
CloseHandle
CreateEventA
FindResourceA
LoadResource
LockResource
SizeofResource
FindFirstFileA
FindNextFileA
FindClose
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
CreateFileW
user32
UnregisterClassA
DestroyMenu
RegisterClipboardFormatA
PostThreadMessageA
GetWindowTextLengthA
GetWindowTextA
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
UnhookWindowsHookEx
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
RegisterWindowMessageA
ValidateRect
SetMenuItemBitmaps
MessageBeep
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ScreenToClient
GrayStringA
DrawTextExA
TabbedTextOutA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfA
ReleaseCapture
GetParent
SetCapture
GetCapture
GetActiveWindow
ClientToScreen
GetSysColor
DrawTextA
DrawFocusRect
FillRect
InflateRect
CopyRect
LoadImageA
SetWindowRgn
PostMessageA
KillTimer
SetTimer
RedrawWindow
InvalidateRect
WinHelpA
IsChild
GetClassLongA
GetClassNameA
SetPropA
GetPropA
UpdateWindow
GetDesktopWindow
GetSystemMetrics
LoadIconA
EnableWindow
GetClientRect
GetWindowRect
IsIconic
SendMessageA
DrawIcon
LoadBitmapA
MessageBoxA
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
CharUpperA
LoadCursorA
GetSysColorBrush
GetMenuCheckMarkDimensions
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
PtInRect
DefWindowProcA
CallWindowProcA
OffsetRect
GetWindowPlacement
GetCursorPos
SystemParametersInfoA
IntersectRect
gdi32
SaveDC
RestoreDC
SetBkColor
SetBkMode
SetTextColor
SetMapMode
GetClipBox
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
GetDeviceCaps
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreateBitmap
CreateSolidBrush
CreateFontIndirectA
CreateRectRgnIndirect
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
CreateDIBSection
SelectObject
StretchBlt
DeleteDC
DeleteObject
GetStockObject
GetPixel
CombineRgn
CreateRectRgn
CreateCompatibleBitmap
BitBlt
OffsetViewportOrgEx
GetObjectA
CreateCompatibleDC
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegOpenKeyExA
shell32
SHBrowseForFolderA
ShellExecuteA
SHCreateDirectoryExA
SHGetPathFromIDListA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoFreeUnusedLibraries
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRevokeClassObject
OleInitialize
CoTaskMemFree
OleUninitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
oleaut32
SysFreeString
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
SysAllocStringLen
Sections
.text Size: 352KB - Virtual size: 351KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.0MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LC Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE