d:\sogouimesvn\trunk\PinyinDev\bin\SogouInput\QuickInput.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b4a71ef01297f24d4e626c035c0a9e48_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b4a71ef01297f24d4e626c035c0a9e48_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b4a71ef01297f24d4e626c035c0a9e48_JaffaCakes118
-
Size
1.0MB
-
MD5
b4a71ef01297f24d4e626c035c0a9e48
-
SHA1
427322544a102eee5db9721e3d3e66d72a2fff95
-
SHA256
8de4256d1bdae2aa8af4490d1eb85159856e6c57857c3576840248574dff9bc7
-
SHA512
de5de94487192d0f1d9e4b63a4e08d03cce9d40150b086687c916391a263c58d45e3f4bf915793f1bdd0f26b8c13a65bcd725e6eedf7fdcbbca0663f39563fe0
-
SSDEEP
24576:6sb30lUKIiT4BDKs+otz4zSr6a/TYcjQKkA2/wR/:5305TWqotz46R/TGKkAlR/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4a71ef01297f24d4e626c035c0a9e48_JaffaCakes118
Files
-
b4a71ef01297f24d4e626c035c0a9e48_JaffaCakes118.exe windows:5 windows x86 arch:x86
7b91fec81ef793f14f7d86c067b8a25c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindResourceW
LoadResource
SizeofResource
QueryPerformanceCounter
QueryPerformanceFrequency
LCMapStringW
WaitForSingleObject
InterlockedCompareExchange
CreateEventW
WideCharToMultiByte
CreateDirectoryW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
CreateMutexW
OpenMutexW
ReleaseMutex
GetCommandLineW
GetCurrentProcess
GetModuleHandleW
GetModuleFileNameW
GetTempPathW
GetCurrentProcessId
InterlockedIncrement
CreateProcessW
MoveFileExW
FileTimeToSystemTime
GlobalFree
CloseHandle
GetCurrentThreadId
DeleteFileW
SetFileAttributesW
SetFilePointer
FormatMessageW
SetLastError
WaitForMultipleObjects
DuplicateHandle
LocalFree
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
OpenEventW
FindFirstFileW
GetSystemDirectoryW
FindClose
RemoveDirectoryW
FindNextFileW
MultiByteToWideChar
InterlockedDecrement
LocalAlloc
GetFileSize
ReadFile
FlushFileBuffers
GetTickCount
VirtualQuery
SetUnhandledExceptionFilter
GetLocalTime
lstrcatW
IsDebuggerPresent
lstrcpyW
GlobalReAlloc
CreateFileA
CreateFileMappingA
OpenFileMappingA
GetWindowsDirectoryA
HeapFree
HeapAlloc
HeapReAlloc
GetStartupInfoW
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
GetDriveTypeW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
RtlUnwind
GetTimeZoneInformation
TerminateProcess
UnhandledExceptionFilter
GetDriveTypeA
FindFirstFileA
GetFileType
HeapCreate
VirtualFree
VirtualAlloc
ExitProcess
GetStdHandle
GetModuleFileNameA
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
GetFullPathNameW
GetCurrentDirectoryA
LCMapStringA
GetModuleHandleA
GetConsoleCP
GetConsoleMode
GetTimeFormatA
GetDateFormatA
GetFullPathNameA
SetStdHandle
SetEndOfFile
GetProcessHeap
FreeLibrary
LoadLibraryA
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProcAddress
GetLastError
GlobalUnlock
CreateFileW
Sleep
LoadLibraryW
GlobalAlloc
OpenProcess
WriteFile
GlobalLock
GlobalSize
LockResource
user32
GetMonitorInfoW
GetCursor
RedrawWindow
IntersectRect
SetRect
GetAsyncKeyState
SubtractRect
MonitorFromPoint
SetWindowRgn
UpdateLayeredWindow
CreateDialogParamW
EndDialog
DialogBoxParamW
DrawTextW
KillTimer
LoadCursorW
InflateRect
RegisterClassExW
CreateWindowExW
IsWindowVisible
DefWindowProcW
wvsprintfW
MessageBoxW
GetSystemMetrics
SetClassLongW
TrackMouseEvent
EnableWindow
ShowWindow
FindWindowW
PostMessageW
CallWindowProcW
SetCursor
EndPaint
DestroyWindow
IsWindowEnabled
BeginPaint
GetScrollInfo
SystemParametersInfoW
SetScrollInfo
SetCursorPos
ClientToScreen
CloseClipboard
SendInput
SetCapture
EnumClipboardFormats
GetClipboardData
GetWindowTextW
EmptyClipboard
OpenClipboard
ReleaseCapture
SetClipboardData
SetWindowTextW
GetWindowThreadProcessId
GetCursorPos
SetForegroundWindow
GetParent
GetForegroundWindow
SetFocus
OffsetRect
GetWindowLongW
SetWindowLongW
SetWindowPos
FillRect
InvalidateRect
GetWindowRect
GetClientRect
GetDC
ReleaseDC
GetWindowTextLengthW
GetClassNameW
IsWindow
GetWindow
MoveWindow
SendMessageW
GetDlgItem
GetDesktopWindow
LoadBitmapW
PtInRect
LoadImageW
IsIconic
SetTimer
gdi32
CombineRgn
StretchBlt
MoveToEx
GetPixel
BitBlt
LineTo
DeleteDC
CreateDIBSection
SelectClipRgn
CreateCompatibleDC
CreateCompatibleBitmap
GetTextExtentExPointW
CreateRectRgn
SetTextColor
OffsetRgn
GetTextExtentPoint32W
GetTextMetricsW
GetCharABCWidthsFloatW
ExtCreateRegion
SetBkColor
GetStockObject
CreateSolidBrush
CreatePen
Rectangle
SelectObject
DeleteObject
GetObjectW
SetBkMode
CreateFontIndirectW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
msimg32
TransparentBlt
AlphaBlend
GradientFill
advapi32
RegEnumValueW
GetTokenInformation
LookupAccountSidW
RegQueryValueExW
RegQueryValueW
RegOpenKeyExW
RegCloseKey
AddAccessAllowedAceEx
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
GetNamedSecurityInfoW
InitializeAcl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
SetEntriesInAclW
GetSidLengthRequired
GetSecurityDescriptorSacl
BuildExplicitAccessWithNameW
OpenProcessToken
RegQueryInfoKeyW
shell32
SHGetFolderPathW
ShellExecuteW
comctl32
InitCommonControlsEx
Sections
.text Size: 658KB - Virtual size: 657KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 21KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.trdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE