d:\dvlp\Vs7.2003\Client\Hb4.0\4.0\WeatherOnTray\Release\WeatherOnTray.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a08ff8649cfb9fcf4f149c585e42142e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a08ff8649cfb9fcf4f149c585e42142e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a08ff8649cfb9fcf4f149c585e42142e_JaffaCakes118
-
Size
244KB
-
MD5
a08ff8649cfb9fcf4f149c585e42142e
-
SHA1
dc14dd404e1f6aa36e894fc50062fad65c3b18b2
-
SHA256
d5cca8bcf2e3c9ff919864269f1570aecbb61cbd835b35daa4b4723d029aad68
-
SHA512
c71478e343037d3c6711edcd7de304218cfabfb24711fbdff916498d3081f2d61a327064c683343edffc56533b0d702bc84e273ea4826e432fb2495b8027c651
-
SSDEEP
3072:3MZ0r/0tI+ktTLbXZqmI3NfZMvQcFT0IWsKnyi7UxMoTNk7O4Mfsqu2BQXqp2sJY:cZ0fTL9qronX9vjx6aX7WOYhE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a08ff8649cfb9fcf4f149c585e42142e_JaffaCakes118
Files
-
a08ff8649cfb9fcf4f149c585e42142e_JaffaCakes118.exe windows:4 windows x86 arch:x86
8c1d8cc02dedec244f47d641972bf2b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
HeapAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpiA
GetLastError
MulDiv
lstrcmpA
WideCharToMultiByte
GetTickCount
SetLastError
GetCurrentProcessId
CloseHandle
ReadFile
GetFileSize
CreateFileA
Sleep
WaitForSingleObject
OpenEventA
CreateThread
CreateEventA
lstrcpynA
lstrcatA
IsDBCSLeadByte
InterlockedIncrement
SetEvent
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
CreateProcessA
GetCommandLineA
WriteFile
UnmapViewOfFile
MoveFileA
GetSystemTime
TlsSetValue
TlsGetValue
SetFilePointer
OutputDebugStringA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
SetFileTime
FileTimeToSystemTime
GetFileTime
TlsAlloc
ResumeThread
TerminateThread
SetUnhandledExceptionFilter
VirtualQuery
GetVersionExA
GetCurrentThread
GetProcAddress
LoadLibraryA
GetProcessHeap
CreateDirectoryA
ReleaseSemaphore
ReleaseMutex
CreateSemaphoreA
CreateMutexA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetStringTypeW
GetStringTypeA
HeapSize
TerminateProcess
VirtualFree
HeapCreate
HeapDestroy
QueryPerformanceCounter
TlsFree
GetCPInfo
GetOEMCP
LCMapStringW
LCMapStringA
GetLocalTime
GetStartupInfoA
GetSystemTimeAsFileTime
HeapReAlloc
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
ExitProcess
LocalFree
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
HeapFree
GetCurrentProcess
FlushInstructionCache
lstrcpyA
GetCurrentThreadId
lstrlenW
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameA
MultiByteToWideChar
InterlockedDecrement
FormatMessageA
lstrlenA
LocalAlloc
DeleteCriticalSection
InitializeCriticalSection
RaiseException
IsBadWritePtr
user32
SetPropA
UnregisterClassA
wsprintfA
PostMessageA
DispatchMessageA
TranslateMessage
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
SetWindowLongA
GetWindowLongA
DestroyWindow
SendMessageA
MoveWindow
GetClientRect
BeginPaint
EndPaint
ReleaseDC
InvalidateRect
GetMessageA
LoadMenuA
GetCursorPos
GetSubMenu
TrackPopupMenu
PostQuitMessage
CharUpperA
PostThreadMessageA
FindWindowA
SendMessageTimeoutA
ReplyMessage
GetSystemMetrics
GetForegroundWindow
LoadIconA
LoadStringA
DestroyIcon
CreateIconIndirect
SetForegroundWindow
DrawTextA
EnumChildWindows
LoadBitmapA
CreateAcceleratorTableA
RemovePropA
CharNextA
GetParent
GetClassNameA
SetWindowPos
RedrawWindow
GetDlgItem
IsWindow
GetFocus
IsChild
GetWindow
DestroyAcceleratorTable
InvalidateRgn
GetDC
FillRect
SetCapture
ReleaseCapture
GetSysColor
CreateWindowExA
RegisterWindowMessageA
RegisterClassExA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetDesktopWindow
GetWindowRect
DefWindowProcA
CallWindowProcA
LoadCursorA
GetClassInfoExA
GetLastActivePopup
SetFocus
KillTimer
SetTimer
ShowWindow
IsWindowVisible
gdi32
DeleteObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetDeviceCaps
GetObjectA
GetStockObject
CreateSolidBrush
CreateFontIndirectA
GetTextExtentPoint32A
SetTextColor
SetBkMode
CreatePatternBrush
CreateBitmapIndirect
SelectObject
advapi32
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegQueryInfoKeyA
shell32
Shell_NotifyIconA
ole32
CoInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
CoUninitialize
StringFromGUID2
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoCreateInstance
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
CoTaskMemRealloc
CoCreateGuid
CoTaskMemAlloc
oleaut32
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SysFreeString
SysStringLen
VariantInit
VariantCopy
VariantClear
VariantChangeType
LoadRegTypeLi
LoadTypeLi
DispCallFunc
SysAllocStringLen
OleCreateFontIndirect
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
shlwapi
StrRChrA
StrToIntA
PathFindExtensionA
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ