d:\Project\Run_ActiveX_BESTEC III\RewardManager\Release\RwrdMngr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8bddf49e1c978f4a1a62c7516dded89c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8bddf49e1c978f4a1a62c7516dded89c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8bddf49e1c978f4a1a62c7516dded89c_JaffaCakes118
-
Size
324KB
-
MD5
8bddf49e1c978f4a1a62c7516dded89c
-
SHA1
05cff6189ce9345281e9d89f01d9c6f91d2138c7
-
SHA256
7dce036bbc8b4aa784efc00c166206818c12ce49b9d56a38dd6ca217b6e8d253
-
SHA512
565567e7550c44fa5873bb038fd1f386057c76a1ae7a669c7bb2a03221470123bd7fe2ec0f45dcc2d052c36d67d7633fcac6100a46ba1c0b7b41e56be243bc2e
-
SSDEEP
6144:6cMkLr/sR5IPPtyb2/dceaUdG9+QiOBvyUDIR5CKn9:6cTht82/dcHUdGjJJu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bddf49e1c978f4a1a62c7516dded89c_JaffaCakes118
Files
-
8bddf49e1c978f4a1a62c7516dded89c_JaffaCakes118.exe windows:4 windows x86 arch:x86
97a8936eb057a9c2f41946626ab0ed81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
GetTickCount
ExitProcess
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitThread
CreateThread
SetStdHandle
GetFileType
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
SetErrorMode
VirtualFree
HeapDestroy
HeapCreate
GetACP
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetDriveTypeA
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetFileTime
GetFileAttributesA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetCurrentProcessId
GlobalAddAtomA
FindNextFileA
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
FreeResource
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GetModuleHandleA
CreateFileA
GetModuleFileNameA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
GetVersion
CompareStringA
InterlockedExchange
MultiByteToWideChar
CompareStringW
OutputDebugStringA
GetVersionExA
lstrcmpiA
Process32Next
TerminateProcess
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetLastError
GetCurrentProcess
LocalFree
DeleteFileA
Sleep
GetCommandLineA
GetTempPathA
GetWindowsDirectoryA
LockResource
WideCharToMultiByte
GetProcAddress
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrlenA
CloseHandle
user32
PostThreadMessageA
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
RegisterClipboardFormatA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
UnregisterClassA
DestroyMenu
GetWindowTextA
MessageBeep
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindow
SetWindowContextHelpId
GetParent
MapDialogRect
SetWindowPos
PostQuitMessage
PostMessageA
GetDesktopWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CharUpperA
EnableWindow
GetClientRect
GetSystemMetrics
SendMessageA
IsIconic
wsprintfA
gdi32
RectVisible
GetStockObject
GetBkColor
GetTextColor
DeleteDC
GetRgnBox
GetMapMode
PtVisible
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
CreateRectRgnIndirect
GetDeviceCaps
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
TextOutA
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
shell32
ShellExecuteA
shlwapi
UrlUnescapeA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFileExistsA
PathFindFileNameA
oledlg
ord8
ole32
CoRegisterMessageFilter
OleUninitialize
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
VariantCopy
SysAllocString
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
OleCreateFontIndirect
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysFreeString
SysAllocStringLen
SysStringLen
iphlpapi
GetAdaptersInfo
psapi
GetModuleFileNameExA
EnumProcessModules
EnumProcesses
wininet
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetQueryDataAvailable
InternetCrackUrlA
InternetCanonicalizeUrlA
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ