d:\Projects\Dot-Net\TargetGate\VCGate\vcgate\trunk\vcgateinst\Release\vcgateinst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab808b0f857357c0fa106188c53ee4e9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ab808b0f857357c0fa106188c53ee4e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab808b0f857357c0fa106188c53ee4e9_JaffaCakes118
-
Size
310KB
-
MD5
ab808b0f857357c0fa106188c53ee4e9
-
SHA1
cb535d20955b78f84998623e5b8293aa89a3d3ab
-
SHA256
052a7457c52fd43ddeedea613ba9a01d0f06d4adb91f0777a1c7be25fbca48ab
-
SHA512
cff3e8d63e762bc61429e641a9187dfd50944514506f44010e31a37b3d534ee36cb187a3f92eb4c8c46413f444c3369214b0545be8bd9ae3d1fc97623096652b
-
SSDEEP
6144:zRswdjysPqfOquwUhdIbWRjt/FKgoiKYKtIPITg0AtVxvgnpZjr:lnjys6OqxIdBR5/FKBiJKQIUAbf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab808b0f857357c0fa106188c53ee4e9_JaffaCakes118
Files
-
ab808b0f857357c0fa106188c53ee4e9_JaffaCakes118.exe windows:4 windows x86 arch:x86
a09f8fa85f702625930e76f2e4fc64e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathFindExtensionA
PathFileExistsA
advapi32
RegOpenKeyExA
RegDeleteValueA
SetSecurityDescriptorDacl
LookupAccountNameA
FreeSid
SetNamedSecurityInfoA
SetEntriesInAclA
AllocateAndInitializeSid
GetNamedSecurityInfoA
SetSecurityDescriptorOwner
GetUserNameA
InitializeSecurityDescriptor
AddAccessAllowedAce
AddAccessDeniedAce
InitializeAcl
GetLengthSid
IsValidSid
RegCloseKey
RegSetValueExA
RegCreateKeyExA
kernel32
FlushFileBuffers
OutputDebugStringA
lstrcatA
lstrcpyA
lstrlenA
LocalFree
FormatMessageA
GetLastError
GetVersionExA
DeleteFileA
RemoveDirectoryA
FindNextFileA
FindClose
FindFirstFileA
CreateFileA
CopyFileA
MoveFileA
CloseHandle
WriteFile
ReadFile
InterlockedExchange
GetACP
GetLocaleInfoA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
InitializeCriticalSection
DeleteCriticalSection
Sleep
GetTickCount
GetFileAttributesA
GetTempFileNameA
LockResource
LoadResource
SizeofResource
FindResourceA
GetShortPathNameA
GetVolumeInformationA
TerminateProcess
OpenProcess
GetFileSize
FreeLibrary
GetProcAddress
LoadLibraryA
WinExec
GetModuleFileNameA
GetSystemDirectoryA
GetTempPathA
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetFilePointer
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetCurrentProcess
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
SetFileAttributesA
ExitProcess
HeapFree
HeapAlloc
HeapReAlloc
HeapSize
user32
wsprintfA
DialogBoxParamA
EndDialog
ShowWindow
GetDlgItem
GetWindowLongA
FindWindowA
GetWindowThreadProcessId
MessageBoxA
GetDlgItemTextA
SetDlgItemTextA
SetWindowLongA
PeekMessageA
IsWindow
IsWindowVisible
IsDialogMessageA
TranslateMessage
DispatchMessageA
shell32
SHGetMalloc
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHCreateDirectoryExA
ole32
CoCreateInstance
CoInitialize
CoTaskMemFree
CoUninitialize
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 592KB - Virtual size: 591KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ