c:\Projects\UI\RD\Sources\ApplicationInstaller2.1\NAI2-UI\Output\Release_Unicode\ApplicationInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8a264f50b1a120f35dcf46ff78ecdd2e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a264f50b1a120f35dcf46ff78ecdd2e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a264f50b1a120f35dcf46ff78ecdd2e_JaffaCakes118
-
Size
330KB
-
MD5
8a264f50b1a120f35dcf46ff78ecdd2e
-
SHA1
ed703067bbf1dd0edb23cbb0b3ed7168abc6d82c
-
SHA256
fa705eec13381be93cc3c138fdc2524b2680e38bd13cd5362ac5c0d474f53f9a
-
SHA512
0d13e6124d7fbccb558b2efcb0e625b3983b83893ee5c3f123b4d0c0bde5587cb1053f7b968b6b1f05fabd5afb2b0dc0a99b59e310724b1c6a79201b7966d4c7
-
SSDEEP
6144:kDJzTMK2DrO0gilZ2vVTB9Yn4OaTP8K8HSsQLH5AJ:kDJzWF2vVTYE8HSsPJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a264f50b1a120f35dcf46ff78ecdd2e_JaffaCakes118
Files
-
8a264f50b1a120f35dcf46ff78ecdd2e_JaffaCakes118.exe windows:4 windows x86 arch:x86
de43c058c584985d9c49edb848e4feb7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathFileExistsW
PathUnquoteSpacesW
SHDeleteKeyW
PathRemoveBlanksW
PathRemoveArgsW
PathRemoveFileSpecW
gdiplus
GdipDrawLineI
GdipDeletePen
GdipCreatePen1
GdiplusShutdown
GdiplusStartup
GdipFillRectangleI
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreateLineBrushFromRectWithAngleI
GdipDeleteBrush
ngscm
?Init@CNbuuLib@@SAXPAUHINSTANCE__@@0@Z
??0CNbuuWindowBackgroundSkin@@QAE@XZ
?NGSCM_GetCommonNGR@@YAPAUHINSTANCE__@@XZ
?SetTooltip@?$CNbuuButtonImpl@VCNbuuCommonButtonSkin@@@@QAEXPAG@Z
?PcsLoadFont@@YAXPAUtagLOGFONTW@@@Z
?TranslateMenuAccelerator@CNbuuWindowBackgroundCtrl@@QAEHPAUtagMSG@@@Z
?AlphaBlendBitmaps@CNBitmapUtil@@QAEHHHH@Z
?CreateColorBackground@CNBitmapUtil@@QAEHKHH@Z
?DeleteBitmap@CNBitmapUtil@@QAEPAUHBITMAP__@@W4BitmapType@@H@Z
?AlphaBlendBitmapsBGPos@CNBitmapUtil@@QAEHHHHHH@Z
?NLoadBitmap@CNBitmapUtil@@QAEPAUHBITMAP__@@PAUHINSTANCE__@@HW4BitmapType@@H@Z
??0CNBitmapUtil@@QAE@XZ
?GetBitmapHeight@CNBitmapUtil@@QAEHW4BitmapType@@@Z
?GetBitmapWidth@CNBitmapUtil@@QAEHW4BitmapType@@@Z
?GetBitmapHandle@CNBitmapUtil@@QAEPAUHBITMAP__@@W4BitmapType@@H@Z
?Hide@CNbuuSplashScreen@@QAEHI@Z
??1CNBitmapUtil@@QAE@XZ
?PcsLoadColor@@YAKPAUHINSTANCE__@@I@Z
??1CNbuuStaticCtrl@@UAE@XZ
??0CNbuuStaticCtrl@@QAE@XZ
??1CNbuuWindowBackgroundCtrl@@UAE@XZ
??0CNbuuWindowBackgroundCtrl@@QAE@XZ
??1CNbuuComboBoxCtrl@@UAE@XZ
??0CNbuuComboBoxCtrl@@QAE@XZ
??1CNbuuCommonButtonCtrl@@UAE@XZ
??0CNbuuCommonButtonCtrl@@QAE@XZ
?GetNextPhoneManufacturer@CPCSL2InfoReader@@QAEPBGXZ
?GetFirstPhoneManufacturer@CPCSL2InfoReader@@QAEPBGXZ
?OnEraseBkGnd@CNbuuSplashScreen@@EAEJIJ@Z
?OnPaint@CNbuuSplashScreen@@EAEJIJ@Z
??1CNbuuWindowBackgroundSkin@@UAE@XZ
?NGSCM_Finalize@@YAXXZ
?DoModal@CCommonAboutDlg@@QAEHXZ
?SetAboutBoxParams@CCommonAboutDlg@@QAEXPAUtagABOUTBOXPARAMS@@@Z
??1CCommonAboutDlg@@UAE@XZ
??1CNbuuSplashScreen@@UAE@XZ
?Show@CNbuuSplashScreen@@QAEHI@Z
??0CNbuuSplashScreen@@QAE@PAUHINSTANCE__@@I@Z
?PcsInitializeWER@@YAHXZ
??0CCommonAboutDlg@@QAE@XZ
?GetUIManufacturer@CPCSL2InfoReader@@QAEPBGXZ
?ReadPCSL@CPCSL2InfoReader@@QAEHPAG@Z
??1CPCSL2InfoReader@@QAE@XZ
??0CPCSL2InfoReader@@QAE@XZ
?m_dwLayout@CNbuuLib@@0KA
?Show@CNbuuCommonMessageBox@@SAHPAUHWND__@@PBG1I@Z
mfc80u
ord635
ord4293
ord1955
ord5161
ord3395
ord6061
ord6271
ord1894
ord2366
ord4259
ord4480
ord3943
ord2638
ord3703
ord3713
ord3712
ord2527
ord2640
ord2534
ord2856
ord2708
ord4301
ord2829
ord2725
ord2531
ord5196
ord1353
ord4961
ord3339
ord6275
ord3796
ord6273
ord1513
ord2163
ord2169
ord2399
ord2381
ord2379
ord2402
ord2407
ord2388
ord2404
ord931
ord927
ord929
ord925
ord920
ord5956
ord1591
ord4271
ord4716
ord3397
ord1297
ord2164
ord5201
ord4179
ord5067
ord1899
ord5144
ord4238
ord1393
ord3939
ord1608
ord1611
ord5911
ord6721
ord4013
ord2418
ord2419
ord5352
ord940
ord4898
ord2933
ord4129
ord4303
ord5006
ord5003
ord2609
ord1904
ord2237
ord2985
ord572
ord715
ord3157
ord1925
ord3678
ord3204
ord3281
ord501
ord709
ord3133
ord1271
ord5637
ord4117
ord3995
ord3286
ord4255
ord5171
ord4276
ord5210
ord5148
ord3940
ord1572
ord1634
ord3677
ord757
ord1155
ord1049
ord1117
ord4025
ord547
ord956
ord334
ord593
ord5221
ord6086
ord5654
ord2239
ord3327
ord4475
ord2832
ord5562
ord5209
ord5226
ord4562
ord3942
ord5222
ord5220
ord2925
ord1911
ord3826
ord5378
ord6215
ord3800
ord5579
ord2054
ord6274
ord3795
ord6272
ord4008
ord4032
ord3444
ord3639
ord368
ord395
ord4699
ord6751
ord6749
ord4258
ord4476
ord2762
ord3034
ord4216
ord1913
ord4251
ord5408
ord1370
ord5588
ord5152
ord2007
ord6234
ord2615
ord2608
ord4560
ord3585
ord4346
ord3676
ord565
ord756
ord1627
ord1539
ord3166
ord1922
ord1474
ord4092
ord2080
ord4228
ord592
ord416
ord651
ord1960
ord5170
ord347
ord1270
ord5609
ord5727
ord1957
ord4585
ord602
ord1920
ord4300
ord1562
ord1299
ord2167
ord5522
ord5829
ord1272
ord2364
ord1946
ord4094
ord2085
ord3238
ord1274
ord6140
ord2365
ord4267
ord2788
ord2361
ord2255
ord5867
ord1352
ord3338
ord5147
ord3968
ord4855
ord4858
ord4373
ord4378
ord4375
ord4393
ord4395
ord4380
ord4771
ord4175
ord4166
ord4775
ord4198
ord4784
ord4437
ord4438
ord1051
ord1021
ord2898
ord1431
ord741
ord6033
ord4119
ord3311
ord4234
ord2086
ord3483
ord3645
ord658
ord6116
ord4755
ord4232
ord2083
ord642
ord3208
ord4230
ord1549
ord1628
ord280
ord577
ord774
ord776
ord3642
ord293
ord283
ord287
ord5711
ord2460
ord6700
ord282
ord1479
ord6094
ord3990
ord5558
ord4100
ord6173
ord5524
ord2261
ord5485
ord1476
ord778
ord3869
ord2271
ord2745
ord1472
ord2260
ord896
ord2444
ord4078
ord5398
ord6301
ord3103
ord2121
ord2311
ord6063
ord1590
ord1646
ord1647
ord2397
ord2409
ord2386
ord2390
ord2392
ord2394
ord2384
ord5229
ord5231
ord1548
ord1118
ord4026
ord566
ord5971
ord1058
ord5096
ord1007
ord2009
ord4320
ord290
ord5484
ord1906
ord900
ord899
ord1236
ord3873
ord5869
ord5862
ord777
ord5712
ord2893
ord6039
ord5930
ord4733
ord4846
ord5491
ord2736
ord2042
ord6167
ord1235
ord860
ord2876
ord3842
ord6177
ord2742
ord277
ord1582
ord2461
ord1252
ord1248
ord3460
ord1176
ord3925
ord2279
ord631
ord386
ord4109
ord2424
ord1079
ord2860
ord6002
ord1086
ord3872
ord1923
ord5442
ord745
ord557
ord762
ord265
ord266
ord764
ord1198
ord616
msvcr80
memset
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
_decode_pointer
?terminate@@YAXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_wcsicmp
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
fclose
_wtol
feof
fgetws
_wfopen
ceil
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
malloc
_swprintf
_vswprintf
_purecall
_wstat64i32
_wcsdup
wcstok
wcsstr
free
floor
calloc
__RTDynamicCast
ftell
fseek
_onexit
_CxxThrowException
memcpy
__CxxFrameHandler3
_wgetenv
kernel32
Process32FirstW
Module32FirstW
Module32NextW
Process32NextW
lstrlenW
InitializeCriticalSection
LoadResource
DeleteCriticalSection
DeleteFileW
CreateFileW
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
OpenEventA
CreateEventA
ResetEvent
WaitForMultipleObjects
SetEvent
WaitForSingleObject
LoadLibraryA
ReadFile
SetFilePointer
GetFileSizeEx
ExitThread
HeapFree
GetProcessHeap
HeapAlloc
SetFileAttributesW
GetFileAttributesW
GetLogicalDrives
GetVersionExW
GetProcAddress
SetLastError
LeaveCriticalSection
EnterCriticalSection
GetTempPathW
WriteFile
LockResource
lstrcpyW
CreateThread
LoadLibraryExW
FreeLibrary
Sleep
GlobalUnlock
GlobalFree
LoadLibraryW
GetLastError
GetCommandLineW
CloseHandle
GetModuleFileNameW
GetModuleHandleW
CreateToolhelp32Snapshot
GetCurrentProcessId
OpenProcess
FindResourceW
user32
TrackPopupMenu
CreateMenu
CreatePopupMenu
AppendMenuW
GetFocus
DrawTextW
BeginPaint
EndPaint
DrawIconEx
CheckMenuRadioItem
GetSubMenu
GetSysColor
SystemParametersInfoW
GetDlgCtrlID
GetParent
GetWindow
SetFocus
InvalidateRect
ReleaseDC
GetWindowDC
SendMessageW
UpdateWindow
GetSystemMenu
IsIconic
GetWindowRect
GetClientRect
MapWindowPoints
IsWindowEnabled
SetCapture
LoadStringW
GetDC
SetWindowTextW
LoadImageW
PostMessageW
UnregisterClassW
GetCapture
SetForegroundWindow
LoadIconW
DefWindowProcW
DestroyMenu
EnableMenuItem
GetSystemMetrics
LoadMenuW
LoadCursorW
SetProcessDefaultLayout
GetLastActivePopup
InflateRect
FillRect
EnableWindow
GetDesktopWindow
ReleaseCapture
SetCursor
PtInRect
FindWindowW
OffsetRect
gdi32
SetTextColor
SetBkMode
CreateFontIndirectW
GetBkColor
BitBlt
SelectObject
CreateSolidBrush
CreateCompatibleDC
DeleteObject
CreatePen
advapi32
OpenProcessToken
RegQueryValueExW
RegCloseKey
LookupAccountSidW
GetTokenInformation
RegSetValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyExW
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderLocation
SHGetMalloc
SHGetFileInfoW
SHGetDesktopFolder
SHGetPathFromIDListW
ord68
SHParseDisplayName
ole32
CoUninitialize
CoInitialize
CoInitializeEx
CoCreateInstance
oleaut32
SafeArrayGetUBound
SysFreeString
SafeArrayPutElement
SafeArrayGetElement
SafeArrayRedim
SysAllocStringLen
SafeArrayCreate
SafeArrayDestroy
SafeArrayGetLBound
SysStringLen
SysAllocString
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ