grpconv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a6d69f764c5bd836efd81b199578bf5f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6d69f764c5bd836efd81b199578bf5f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6d69f764c5bd836efd81b199578bf5f_JaffaCakes118
-
Size
94KB
-
MD5
a6d69f764c5bd836efd81b199578bf5f
-
SHA1
c53b478235e4a30f58fa37d875c8258e018b70e5
-
SHA256
d3ac571cb5ae2f0ec202ada30811591e929c6ac203ef2ded4ca50b31b02202c9
-
SHA512
debc144011ccfef6e49c654c42935489dd2e9d5fc615de1dfcefb813a6a3429625db6a5937a2469338afe512bdecf12313ad30067f2eb97a47b71f3cc92b7250
-
SSDEEP
1536:dV1g/Iod+wnX1TsJIEIcZyEAdkVnE3g4tq9h2X8IuFloUWjsbZm:dV+IoQ44JIEIcrwsE3g4a4XhSl6sbZm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6d69f764c5bd836efd81b199578bf5f_JaffaCakes118
Files
-
a6d69f764c5bd836efd81b199578bf5f_JaffaCakes118.exe windows:5 windows x86 arch:x86
2fb5c8d61922dd437c088d4799d715d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_vsnwprintf
memmove
advapi32
RegEnumKeyW
RegQueryInfoKeyW
RegDeleteKeyW
RegQueryValueExW
RegEnumValueW
RegOpenKeyExW
RegQueryValueW
RegCloseKey
RegEnumKeyExW
RegOpenKeyW
RegSetValueExW
RegCreateKeyW
RegSetValueW
kernel32
GlobalAlloc
ReadFile
SetFilePointer
LocalFree
FreeResource
LockResource
LoadResource
FindResourceW
FreeLibrary
EnumResourceNamesW
LoadLibraryExW
SetErrorMode
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GlobalSize
GlobalReAlloc
GlobalUnlock
MultiByteToWideChar
CloseHandle
WriteFile
CreateFileW
DeleteFileW
GetTempFileNameW
GetEnvironmentVariableW
lstrlenA
RemoveDirectoryW
SetFileAttributesW
GetLastError
GlobalLock
MulDiv
WritePrivateProfileStringW
GetModuleFileNameW
WinExec
LoadLibraryW
GetThreadLocale
ExitProcess
GetStartupInfoW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
lstrcmpW
GetPrivateProfileSectionW
LocalAlloc
GlobalFree
lstrcmpiW
lstrlenW
SearchPathW
GetWindowsDirectoryW
FindClose
FindFirstFileW
SetLastError
GetProcAddress
GetModuleHandleW
lstrcpynW
ExpandEnvironmentStringsW
MoveFileW
gdi32
GetTextExtentPointW
GetTextExtentExPointW
GetDeviceCaps
user32
SetForegroundWindow
LoadStringW
LookupIconIdFromDirectory
CopyRect
LoadCursorW
SetCursor
SystemParametersInfoW
GetLastActivePopup
MessageBoxW
GetDlgItem
GetDC
GetClientRect
ReleaseDC
GetSystemMetrics
EnableMenuItem
PeekMessageW
DispatchMessageW
SendDlgItemMessageW
DestroyWindow
CreateDialogParamW
SetDlgItemTextW
GetSystemMenu
CharNextW
comctl32
ord17
ord358
ord235
ord324
ord236
ord73
ord323
ord326
ord321
ord320
ord365
ord332
ord328
ord334
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
shell32
ord195
FindExecutableW
ord32
ord31
SHChangeNotify
ord34
ord57
ord39
ord175
ord49
ord165
ord119
ord155
SHGetSpecialFolderLocation
ord37
ord33
ord196
SHGetPathFromIDListW
ord96
ord25
ord157
ord29
ShellExecuteExW
ord128
ord63
ord23
ord58
ord52
ord56
ord51
ord94
ord45
ord36
ord35
ord164
ord79
SHAddToRecentDocs
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ