s:\sdui\cuestatusroot\statusrootimp\release\hpqste08.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ac1fa989e9731c0e7f66ae7b4696e2ba_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ac1fa989e9731c0e7f66ae7b4696e2ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac1fa989e9731c0e7f66ae7b4696e2ba_JaffaCakes118
-
Size
208KB
-
MD5
ac1fa989e9731c0e7f66ae7b4696e2ba
-
SHA1
8c6aea4e185a9fdaf9370b0012ddce06d8dc8409
-
SHA256
9006c0b2d1ea5bbde07acd835149fa9280b79284f7bd0af2103781e80f7365ec
-
SHA512
0df95c46898eb793a5d2e53d39c318e460ccb061c390125bebd2a63efa6ee32220b244a2028541388173e3c542d62a32065251e53684df36045b90b90f1971f8
-
SSDEEP
3072:17npZb4P/YL5cH1Hvu0XSWggDy7kpuMdIhPZ3jtFtLOpzvTStK:RpZXyvZXS0D9IhPZTLdOZTv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac1fa989e9731c0e7f66ae7b4696e2ba_JaffaCakes118
Files
-
ac1fa989e9731c0e7f66ae7b4696e2ba_JaffaCakes118.exe windows:4 windows x86 arch:x86
1ad24da8a689512354fdcab27a443929
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
FindFirstFileA
WaitForSingleObject
GetCurrentThreadId
CreateFileA
lstrcpyA
OutputDebugStringA
FormatMessageA
Sleep
CreateThread
CreateEventA
GlobalDeleteAtom
GlobalGetAtomNameA
GetModuleHandleA
SetEvent
GlobalAddAtomA
GetCommandLineA
ExitProcess
FreeLibrary
CloseHandle
GetVersionExA
GetShortPathNameA
LoadLibraryA
SetErrorMode
CreateDirectoryA
GetFileAttributesA
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
FindNextFileA
FindClose
GetPrivateProfileIntA
LocalAlloc
WritePrivateProfileStringA
GetPrivateProfileStringA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcmpiA
lstrlenW
MultiByteToWideChar
GetTickCount
DeleteCriticalSection
RaiseException
GetProcAddress
GetSystemTimeAsFileTime
user32
GetWindowLongA
DefWindowProcA
TranslateMessage
DispatchMessageA
PostMessageA
UnregisterClassA
CharNextA
wsprintfA
LoadStringA
CreateWindowExA
RegisterClassA
LoadCursorA
GetMessageA
PostThreadMessageA
CharUpperA
DestroyWindow
RegisterWindowMessageA
FindWindowA
MessageBoxA
winspool.drv
EnumJobsA
OpenPrinterA
SetJobA
SetPrinterA
ClosePrinter
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
VarBstrCat
SysAllocStringLen
SysAllocStringByteLen
SysStringByteLen
SysAllocString
LoadRegTypeLi
LoadTypeLi
VarBstrCmp
VariantInit
VariantClear
VariantCopy
DispCallFunc
SetErrorInfo
SysStringLen
CreateErrorInfo
atl80
ord31
ord11
ord10
ord64
ord22
ord18
ord23
ord61
ord58
ord32
ord30
ord25
ord17
ord20
msvcr80
_controlfp_s
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
_except_handler4_common
_chdrive
_chdir
_getcwd
isxdigit
iswctype
toupper
_recalloc
memset
sprintf_s
atol
_wcsicmp
_mbstok_s
atoi
calloc
memmove_s
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
_ltoa_s
strcat_s
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
memcpy_s
_mbsicmp
_mbschr
??2@YAPAXI@Z
_resetstkoflw
malloc
_purecall
??_U@YAPAXI@Z
??_V@YAXPAX@Z
_ismbcspace
??3@YAXPAX@Z
free
_CxxThrowException
__CxxFrameHandler3
_mbsnbcpy_s
strcpy_s
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Exports
Exports
?COMWndProc@@YGJPAUHWND__@@IIJ@Z
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE