c:\dev21\regclean\trunk_ns\release\RegClean.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae4bd5fe39f5c227b9499ba4e685429e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae4bd5fe39f5c227b9499ba4e685429e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae4bd5fe39f5c227b9499ba4e685429e_JaffaCakes118
-
Size
5.5MB
-
MD5
ae4bd5fe39f5c227b9499ba4e685429e
-
SHA1
b516eaef8f1b7b00fd11ffc0c7b5027a33f38831
-
SHA256
f9dbe70f4582c582898d59f9782400befd0fd7bb963bd00924bdacf842f42bdc
-
SHA512
0e0700ad060ecb3e15f93d58a43bf840fbe97b29c0ca69b9d0a92af2bf9ef77cdfae56db86f56dc2bb670418c06eeb83665c807204f556a8e8b2fb5aeaaf7216
-
SSDEEP
49152:flY2auuax8EuGBJ0+J0LT5M0HYnkLvcumWEw5EqiLySxU2CL4u6y:dY2uax4GBa+J0B9Ew5EqiLySxU2CL4ut
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae4bd5fe39f5c227b9499ba4e685429e_JaffaCakes118
Files
-
ae4bd5fe39f5c227b9499ba4e685429e_JaffaCakes118.exe windows:4 windows x86 arch:x86
2477dad89489f0f9dec2f87a4666aaf9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GlobalDeleteAtom
SuspendThread
GlobalAddAtomA
GetCurrentProcessId
GetModuleFileNameW
InterlockedDecrement
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetThreadLocale
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
CreateFileA
RaiseException
GlobalFlags
GlobalReAlloc
GlobalHandle
LocalReAlloc
InterlockedIncrement
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
HeapReAlloc
VirtualProtect
lstrcmpA
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
ExitThread
CreateThread
SetEnvironmentVariableA
SetStdHandle
GetFileType
ExitProcess
RtlUnwind
HeapSize
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetACP
IsValidCodePage
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetDriveTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileW
QueryDosDeviceA
ReadFile
WriteFile
VirtualFree
VirtualAlloc
DisconnectNamedPipe
FlushFileBuffers
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
ConnectNamedPipe
GetTempPathA
GetCurrentThread
WritePrivateProfileStringA
HeapFree
GetProcessHeap
HeapAlloc
GetStdHandle
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateDirectoryA
InitializeCriticalSection
GetSystemTime
CreateProcessA
SearchPathA
LocalAlloc
GetSystemInfo
FormatMessageA
GetFileTime
ExpandEnvironmentStringsA
LocalFree
MoveFileA
CopyFileA
TerminateProcess
SetFileAttributesA
GetFileAttributesA
CreateNamedPipeA
GetVersionExA
lstrcatA
lstrcpyA
GlobalAlloc
ResumeThread
GlobalFree
GlobalUnlock
GlobalLock
GetWindowsDirectoryA
ResetEvent
SetEvent
FreeResource
MulDiv
GetModuleFileNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
GetLocalTime
SetThreadPriority
GetModuleHandleA
CreateEventA
FreeLibrary
WaitForSingleObject
SetLastError
WinExec
FindFirstFileA
SetCurrentDirectoryA
LockResource
SizeofResource
LoadResource
FindResourceA
GetCurrentDirectoryA
DeleteFileA
FindClose
FindNextFileA
Sleep
GetCurrentProcess
CloseHandle
LoadLibraryA
GetProcAddress
GetLastError
CompareStringA
MultiByteToWideChar
CompareStringW
GetEnvironmentVariableA
InterlockedExchange
WideCharToMultiByte
lstrlenA
VirtualQuery
GetVersion
user32
DestroyMenu
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
CharNextA
MapDialogRect
SetWindowContextHelpId
RegisterClipboardFormatA
GetNextDlgGroupItem
PostThreadMessageA
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetScrollInfo
CallWindowProcA
OffsetRect
GetWindowPlacement
GetMenuItemID
GetMenuItemCount
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
ScreenToClient
GrayStringA
DrawTextExA
TabbedTextOutA
UnhookWindowsHookEx
SetFocus
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
GetWindow
GetWindowThreadProcessId
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetMessageA
IsWindowVisible
GetKeyState
ValidateRect
PostQuitMessage
TrackMouseEvent
HideCaret
SetActiveWindow
GetActiveWindow
IsWindowEnabled
GetDesktopWindow
GetFocus
IsWindow
SetCapture
PtInRect
MessageBeep
CopyIcon
InflateRect
GetCaretPos
DestroyIcon
DrawFocusRect
DrawEdge
ReleaseCapture
ClientToScreen
WindowFromPoint
GetCapture
GetDC
SetClassLongA
SendMessageA
LoadBitmapA
SetWindowLongA
DestroyCursor
GetWindowTextA
GetWindowTextLengthA
SendMessageCallbackA
CreateWindowExA
EndPaint
BeginPaint
SetPropA
GetDlgCtrlID
DefWindowProcA
GetPropA
CharUpperA
PeekMessageA
RedrawWindow
TranslateMessage
EnableWindow
GetWindowLongA
DispatchMessageA
SetTimer
KillTimer
ExitWindowsEx
FindWindowA
MessageBoxA
PostMessageA
InvalidateRect
GetWindowRect
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
LoadIconA
LoadMenuA
SetForegroundWindow
GetSubMenu
GetCursorPos
TrackPopupMenu
GetSysColor
CopyRect
DrawTextA
SetWindowRgn
SetCursor
SystemParametersInfoA
SetWindowPos
GetWindowDC
ReleaseDC
LoadCursorA
SetRect
UnregisterClassA
RegisterClassExA
GetParent
FillRect
GetSysColorBrush
IntersectRect
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ArcTo
ExtSelectClipRgn
CreatePen
SetViewportOrgEx
CreateRectRgnIndirect
GetMapMode
GetRgnBox
PtVisible
TextOutA
Escape
GetStockObject
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
GetClipBox
SetMapMode
RestoreDC
SaveDC
CreateBitmap
CreatePatternBrush
GetBkColor
GetCurrentObject
GetTextColor
GetTextExtentPoint32A
ExtTextOutA
GetTextMetricsA
ExtCreateRegion
GetPixel
SelectClipRgn
StretchBlt
CreateCompatibleBitmap
SetBkMode
DeleteDC
SelectObject
SetTextColor
SetBkColor
CreateFontIndirectA
BitBlt
CreateCompatibleDC
DeleteObject
CombineRgn
CreateRectRgn
CreateSolidBrush
GetDeviceCaps
GetObjectA
RectVisible
msimg32
GradientFill
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
_TrackMouseEvent
shlwapi
PathFileExistsA
PathIsDirectoryA
UrlUnescapeA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
SHDeleteKeyA
oledlg
ord8
ole32
CoInitializeEx
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SafeArrayGetElemsize
OleCreateFontIndirect
OleLoadPicture
SysFreeString
SysStringLen
VarBstrCmp
SysAllocStringLen
SysAllocString
VariantClear
VariantChangeType
VariantInit
SysAllocStringByteLen
VariantCopy
DispCallFunc
LoadRegTypeLi
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Exports
Exports
PIEImportTest
Sections
.text Size: 836KB - Virtual size: 834KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 176KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7.4MB - Virtual size: 7.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ