e:\main_launcher\stelecom\Main.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a7b3e4fa74dc94db60cce98e174e8b7e_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
a7b3e4fa74dc94db60cce98e174e8b7e_JaffaCakes118
-
Size
352KB
-
MD5
a7b3e4fa74dc94db60cce98e174e8b7e
-
SHA1
b51a640b1dc03bc221d5e7bbb6856f1578c85b26
-
SHA256
1f663f03c3ac43593d6e4b8db80ca86134c58dd096114d25c3cade3cc2a37848
-
SHA512
71f8112d7f70e4f71f5f59fc4556e807cfdc27efdc7a3ebebb2fbf5d393aa58a5576afecc500504a5318901c481605600be7a0ca8cf17c203e90d3219bb87f26
-
SSDEEP
6144:8nNdzSFA2SjZzAAoCKXyUp37Tpkdu9xJ+Arw7+HoCx9mSM:86t/Aev3Zk4xfvICx9nM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a7b3e4fa74dc94db60cce98e174e8b7e_JaffaCakes118
Files
-
a7b3e4fa74dc94db60cce98e174e8b7e_JaffaCakes118.exe windows:4 windows x86 arch:x86
5550ff0a99130cb32d471bd803f43f12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetVersionExA
lstrcmpW
GlobalFindAtomA
GlobalFlags
SetErrorMode
GetCPInfo
GetOEMCP
VirtualAlloc
HeapReAlloc
HeapAlloc
HeapFree
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetThreadLocale
GlobalGetAtomNameA
GetModuleFileNameW
GetCurrentProcessId
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
lstrcmpA
FreeLibrary
GetModuleHandleA
GetProcAddress
GlobalAddAtomA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
WritePrivateProfileStringA
DebugBreak
InterlockedIncrement
OutputDebugStringA
InterlockedDecrement
DeviceIoControl
CreateFileA
GetDriveTypeA
MultiByteToWideChar
GetLastError
lstrlenA
GetVersion
CompareStringA
InterlockedExchange
Sleep
GetVolumeInformationA
GetLogicalDrives
TerminateProcess
CloseHandle
CreateProcessA
GetModuleFileNameA
GetPrivateProfileStringA
FindResourceA
LoadResource
LockResource
SizeofResource
IsDebuggerPresent
WideCharToMultiByte
user32
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
SetWindowPos
ShowWindow
SetWindowLongA
GetDlgCtrlID
IsWindow
SetWindowTextA
GetDlgItem
GetWindow
SetForegroundWindow
IsIconic
GetWindowTextA
wsprintfA
GetActiveWindow
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
DestroyMenu
GetClientRect
UnregisterClassA
GetLastActivePopup
MessageBoxA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
SendMessageA
SetCursor
PostQuitMessage
PostMessageA
EnableWindow
IsWindowEnabled
GetWindowLongA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowThreadProcessId
GetParent
CopyRect
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
DeleteObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE