p:\Projects\Bravostudio\GameVance.200\PopupClient\HookSrv\Release\HookSrv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b94f5aa59f3a20599a3eb87e4af543b6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b94f5aa59f3a20599a3eb87e4af543b6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b94f5aa59f3a20599a3eb87e4af543b6_JaffaCakes118
-
Size
77KB
-
MD5
b94f5aa59f3a20599a3eb87e4af543b6
-
SHA1
efdbb44446a2f560ca73713f61ca7bbd49df40d7
-
SHA256
35803ae768328bd785a2ac4c55bae22e0b73e4fa462fc03585859d831d2e1c5d
-
SHA512
3c614a313331ad4b2530f40a5f3a4c65586463ef5bf3de61ffd969bc0a018734d062f6ea271e11c62940694fba8c0d7e496da1372af2e04d81c1b2b1318cbad8
-
SSDEEP
1536:nrx5jII1vtjSI1ogLJOsKtdMlbTTx2ORFK7ULAD:rx5kI1RtOqlN2ORFGULY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b94f5aa59f3a20599a3eb87e4af543b6_JaffaCakes118
Files
-
b94f5aa59f3a20599a3eb87e4af543b6_JaffaCakes118.exe windows:4 windows x86 arch:x86
09ed3a7efb8ac7b4daed18dc65aaf2bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
StrNCatA
StrStrIA
StrStrA
wnsprintfA
gvcfglib
GetUuid
?IsPopupEngineDisabled@@YGHXZ
?GetExcludedUrlsSeq@@YGKPAD@Z
?SetPopupsStatusDisabled@@YGHKPAD@Z
?SetCheckPopServer@@YGHPAD0@Z
?SetDefaultCfgServer@@YGHPAD0@Z
SetAdLocation
?SetGeoIPCountryCode@@YGHPAD0@Z
?SetClientId@@YGHPAD0@Z
?xml_parse_config@@YGHPADPAPAU_tagCONFIG_STRUCT@@PAHPAUst_string_table@@@Z
?SetExcludedUrlsSeq@@YGHKPAD@Z
?string_table_add@@YGHPAUst_string_table@@PAD@Z
?GetGeoIPCountryCode@@YGHPADH0@Z
GetAdLocation
?GetDefaultCfgServer@@YGHPADK0@Z
?string_table_alloc@@YGHPAPAUst_string_table@@@Z
?GetPopupCountNT@@YGKPAD@Z
?GetPopupCountT@@YGKPAD@Z
?GetLastPopupTimeNT@@YG?AU_FILETIME@@PAD@Z
?GetLastPopupTimeT@@YG?AU_FILETIME@@PAD@Z
?GetClientId@@YGHPADK0@Z
?IsHeaderFirstRun@@YGHXZ
?GetCheckPopServer@@YGHPADK0@Z
?GetWS2SendFrame@@YGHPADK@Z
?SetCrc64@@YGHPAD0@Z
?string_table_delete_all@@YGHPAUst_string_table@@@Z
?GetCrc64@@YGHPADK0@Z
?GetClientInstallDate@@YG?AU_FILETIME@@XZ
?GetCfgFilePath@@YGHPADH@Z
?SetClientInstallDate@@YGXU_FILETIME@@@Z
?SetLastPopupTimeNT@@YGHU_FILETIME@@PAD@Z
?SetPopupCountNT@@YGHKPAD@Z
?SetLastPopupTimeT@@YGHU_FILETIME@@PAD@Z
?SetPopupCountT@@YGHKPAD@Z
gvpop
?LoadFiredPopups_NT@@YGHPAPAU_tagQoolPopup@@PAD@Z
?LoadFiredPopups_T@@YGHPAPAU_tagQoolPopup@@PAD@Z
?ParsePacketContent@@YGHPAU_tagHttpData@@PAUHWND__@@PAUst_string_table@@2PAPAU_tagQoolPopup@@3H@Z
?IsPopupInProgress@@YGHXZ
?CanCheckPopup@@YGHPAU_TSharedStruct@@PAU_tagPopupInfo@@@Z
?RemoveOldPopups@@YGHPAPAU_tagQoolPopup@@@Z
?SaveQoolPopups_NT@@YGHPAU_tagQoolPopup@@PAD@Z
?AddFiredPid@@YGHPAPAU_tagQoolPopup@@HH@Z
?ShowPopupInDefaultBrowser2@@YGHKPAU_tagPopupData@@@Z
?SaveQoolPopups_T@@YGHPAU_tagQoolPopup@@PAD@Z
?ShowPopupInDefaultBrowser@@YGHKPAU_tagPopupData@@@Z
?ParsePopupData@@YGHPADPAU_tagPopupData@@@Z
?SetPopupInProgress@@YGHH@Z
gvutil
?GetWindowsProductId@@YGHPADK@Z
?GetIEVersion@@YGXPADK@Z
?GetOSVersionString@@YGHPADK@Z
?GetHardwareHashCrcHex@@YGHPADH@Z
?EnumTasks@@YGHP6GHPADPAX@Z1@Z
?task_can_execute@@YGHPADPAX@Z
?GetUniqueClientId@@YGHPADK@Z
?DeleteRecoveryModule@@YGXXZ
?DeleteOldTasks@@YGHPAD@Z
?CreateTask@@YGHPAU_tagTASK_STRUCT@@@Z
?SetTaskStateExecuted@@YGHPADH@Z
?SaveFileToDisk@@YGHPADPBXH@Z
gvhlp
?FindBrowserWindow@@YGPAUHWND__@@K@Z
?FileTimeSecondsBetween@@YG_JU_FILETIME@@0@Z
?ScheduleFileUpdate@@YGXPAD0@Z
?IsWindowsMe@@YGHXZ
?ModuleFromAddress@@YGPAUHINSTANCE__@@PAX@Z
?HostToIP@@YGHPAD0K@Z
?Base64EncodeFunc@@YGHPAD0H@Z
?IsWindowsNT@@YG_NXZ
kernel32
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
QueryPerformanceCounter
HeapSize
VirtualAlloc
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
EnterCriticalSection
LeaveCriticalSection
VirtualFree
TlsSetValue
TlsFree
TlsAlloc
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetCurrentProcess
TerminateProcess
VirtualQuery
InterlockedExchange
RtlUnwind
GetCommandLineA
GetStartupInfoA
VirtualProtect
GetSystemInfo
TlsGetValue
GetProcAddress
ReleaseMutex
OpenMutexA
WaitForSingleObject
GetModuleHandleA
GetTempPathA
SetLastError
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetLocalTime
SystemTimeToFileTime
IsBadWritePtr
CreateFileMappingA
MapViewOfFile
LocalFree
GetModuleFileNameA
lstrcpynA
lstrlenA
lstrcatA
GetWindowsDirectoryA
GetVersionExA
HeapReAlloc
CloseHandle
HeapFree
WriteFile
HeapAlloc
GetProcessHeap
lstrcpyA
GetCurrentThreadId
GetCurrentProcessId
Sleep
GetLastError
CreateMutexA
HeapDestroy
HeapCreate
IsBadReadPtr
GetTickCount
LoadLibraryA
ExitProcess
CreateProcessA
user32
RegisterClassExA
DispatchMessageA
DestroyWindow
TranslateMessage
GetMessageA
wsprintfA
RegisterWindowMessageA
GetLastInputInfo
PostQuitMessage
DefWindowProcA
PostMessageA
SendMessageA
ShowWindow
CreateWindowExA
SetTimer
KillTimer
FindWindowA
advapi32
RegCloseKey
RegCreateKeyA
SetNamedSecurityInfoA
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
ole32
CoInitialize
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ