D:\BKIS\Coding\Bkav2009 Projects\Bkav2009Setup\Release\Bkav2009Uninstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a250f06f61a95482bc060ffac1118621_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a250f06f61a95482bc060ffac1118621_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a250f06f61a95482bc060ffac1118621_JaffaCakes118
-
Size
293KB
-
MD5
a250f06f61a95482bc060ffac1118621
-
SHA1
624bee361934aec7a99b8fce66d9103a03a1e6ff
-
SHA256
d0b9302838531a4c4a0a1914885b7fae3ed10c8f51698a23f244c342a9b8f5a8
-
SHA512
c6d74d1eaf49c3d66980f9d9ec974e7334f1f88e738db17e1d9f4499312397000895788c850bfc4c78c13fd70484f9c9a61ebe39031c416a4c0c93194a62ea53
-
SSDEEP
6144:BWbDK3Kw4H/ZayQ/Dmi1LpHIG1lwTWEeqN9e:cbPZab/Dmi1FHICmT7a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a250f06f61a95482bc060ffac1118621_JaffaCakes118
Files
-
a250f06f61a95482bc060ffac1118621_JaffaCakes118.exe windows:5 windows x86 arch:x86
deb6507c755d64c8447cf6b6489f47f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
SetErrorMode
GetStartupInfoW
HeapAlloc
HeapFree
RtlUnwind
ExitProcess
ExitThread
CreateThread
RaiseException
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetFileTime
GetFileSizeEx
GetFileAttributesW
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileAttributesExW
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileW
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
FormatMessageW
LocalFree
MulDiv
GetModuleHandleA
InterlockedDecrement
GlobalFindAtomW
GetVersionExW
CompareStringW
LoadLibraryA
GetVersionExA
GetCurrentProcessId
GlobalAddAtomW
CreateEventW
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
SetLastError
GlobalUnlock
GlobalFree
FreeResource
WritePrivateProfileStringW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryW
CompareStringA
MultiByteToWideChar
WideCharToMultiByte
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
FreeLibrary
GetModuleHandleW
GetProcAddress
GetCurrentProcess
ExpandEnvironmentStringsW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
RemoveDirectoryW
FindClose
FindNextFileW
FindFirstFileW
MoveFileExW
DeleteFileW
SetFileAttributesW
GetLongPathNameW
GetSystemDirectoryW
GetModuleFileNameW
lstrlenW
CreateProcessW
GetWindowsDirectoryW
Sleep
CloseHandle
GetLastError
CreateMutexW
FindResourceW
LoadResource
LockResource
GetSystemTimeAsFileTime
SizeofResource
user32
UnregisterClassW
GetSysColorBrush
LoadCursorW
CharUpperW
DestroyMenu
EndPaint
BeginPaint
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ShowWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EnableWindow
LoadIconW
GetForegroundWindow
SendMessageW
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
PtInRect
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
IsWindowVisible
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
EnableMenuItem
CopyRect
DestroyIcon
FindWindowW
FindWindowExW
PostMessageW
PostQuitMessage
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongW
IsWindow
DestroyWindow
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
GetMenuState
CheckMenuItem
ReleaseDC
GetDC
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
gdi32
GetDeviceCaps
GetStockObject
DeleteDC
ExtTextOutW
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetObjectW
TextOutW
RectVisible
PtVisible
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateFontIndirectW
Escape
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
DeleteService
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCreateKeyExW
ControlService
QueryServiceStatusEx
QueryServiceConfigW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegDeleteValueW
RegSetValueExW
RegQueryValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathRemoveFileSpecW
PathIsDirectoryW
PathIsUNCW
oleaut32
VariantClear
VariantChangeType
VariantInit
psapi
GetModuleFileNameExW
Sections
.text Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE