f:\A\depot\stg\install\install\utils\dolce\dolce\Release\ATICustomerCare.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8b5bc37c5695e1b91492293de3f790e6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8b5bc37c5695e1b91492293de3f790e6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b5bc37c5695e1b91492293de3f790e6_JaffaCakes118
-
Size
320KB
-
MD5
8b5bc37c5695e1b91492293de3f790e6
-
SHA1
472ea2a131b7c2b1d48761eb5a7e065a6cc5c0f1
-
SHA256
bec5dcc02915fe1959f4ef0baf15c44e2953e0385de46924bbb810ac2469edf7
-
SHA512
2ac4bde770b8174ee1abb03e8c27670f2e49e2bd2147e6fe3f9d35f3984cce88464d1280e53fe788d0e8a0dbb2fe28c2a0c0a49e62ac979385558fe904b23b1f
-
SSDEEP
6144:DkWpQRnpzdcDiHHzmanJJHbRk+rv8LOAyAdAyAODEp0MZc0MZsi5:4knaJdOsv8tMZ3MZh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b5bc37c5695e1b91492293de3f790e6_JaffaCakes118
Files
-
8b5bc37c5695e1b91492293de3f790e6_JaffaCakes118.exe windows:4 windows x86 arch:x86
cd31215514b5ec46174f89fa4af29a8b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetSystemTimeAsFileTime
RtlUnwind
ExitProcess
RaiseException
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
Sleep
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetEnvironmentVariableA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
lstrlenA
SetErrorMode
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GetModuleHandleA
GetCurrentProcessId
GlobalAddAtomW
CloseHandle
GlobalUnlock
GlobalFree
FreeResource
InterlockedDecrement
SetLastError
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryW
WideCharToMultiByte
CompareStringA
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
GlobalLock
lstrcmpW
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
GetProcAddress
GetUserDefaultUILanguage
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
LocalFree
FormatMessageW
GetLastError
LeaveCriticalSection
EnterCriticalSection
lstrlenW
InterlockedExchange
MulDiv
GetModuleHandleW
VirtualFree
GetModuleFileNameW
user32
DestroyMenu
GetSysColorBrush
UnregisterClassW
LoadCursorW
ShowWindow
SetWindowTextW
IsDialogMessageW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextW
GetWindow
SetFocus
GetSysColor
EndPaint
BeginPaint
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
UnhookWindowsHookEx
PostQuitMessage
PostMessageW
EnableWindow
ReleaseDC
SendMessageW
GetDC
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
LoadIconW
SetClassLongW
UnregisterClassA
gdi32
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
CreateDIBSection
GetObjectW
CreateCompatibleDC
SelectObject
SetDIBColorTable
DeleteDC
CreateFontIndirectW
GetDeviceCaps
msimg32
TransparentBlt
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegSetValueExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegQueryValueExW
shell32
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionW
PathFindFileNameW
PathFileExistsW
oleaut32
VarDateFromStr
VariantTimeToSystemTime
VariantClear
VariantChangeType
VariantInit
gdiplus
GdipDeleteGraphics
GdiplusStartup
GdipFree
GdipCloneImage
GdipAlloc
GdipDisposeImage
GdipCreateBitmapFromFile
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImagePaletteSize
GdipGetImagePalette
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdiplusShutdown
GdipDrawImageI
Sections
.text Size: 172KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.erdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE