e:\120330_191803_build_CheeryChicken_CheeryChicken_1.0.7.0\source\source_sa\bin\Release\ClientSACB.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b64ad5033a5f07eebd62dd7b4543d5eb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b64ad5033a5f07eebd62dd7b4543d5eb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b64ad5033a5f07eebd62dd7b4543d5eb_JaffaCakes118
-
Size
265KB
-
MD5
b64ad5033a5f07eebd62dd7b4543d5eb
-
SHA1
a3094224cf99bdb2d3ba1f68bbf28be51df3e190
-
SHA256
12c8021553a0b9d5914d7979574e7ae5bc72797d0dce71ae8310af1d1b359676
-
SHA512
40ab827517dcfd856fba4fc557514a754de96079c90e2a84065d3b669fac56c276bce40976114d59d4b38c30cdc4de2b146bec00151471fcccacbabfefb1df5e
-
SSDEEP
6144:bkzbnTJPLQnDA8f8NYQTCRCE2iicNKISVpaYPMmI7WrX:gbTFLSDA8f6YQTCRUiicNKI00fi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b64ad5033a5f07eebd62dd7b4543d5eb_JaffaCakes118
Files
-
b64ad5033a5f07eebd62dd7b4543d5eb_JaffaCakes118.exe windows:5 windows x86 arch:x86
39b01aded6073c5a6c80b67ea5ed9ceb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ord17
kernel32
lstrcmpW
MulDiv
LoadLibraryW
GetVersionExW
lstrcpynA
lstrcpynW
GetTickCount
DeleteFileW
ReadFile
GetFileSize
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
LCMapStringW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
Sleep
HeapCreate
GetStdHandle
WriteFile
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
DecodePointer
EncodePointer
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetLastError
MultiByteToWideChar
lstrlenA
SetLastError
CloseHandle
GetCurrentProcess
LocalFree
LocalAlloc
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FlushInstructionCache
lstrlenW
GetCurrentThreadId
GetProcAddress
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
LoadLibraryExW
FreeLibrary
lstrcmpiW
user32
RemoveMenu
GetMenuItemCount
AppendMenuW
DestroyMenu
CreatePopupMenu
FindWindowW
SendMessageTimeoutA
CreateAcceleratorTableW
GetMenuItemInfoW
DestroyAcceleratorTable
GetDesktopWindow
BeginPaint
EndPaint
ReleaseCapture
LoadStringA
GetDlgItem
IsChild
SetFocus
MonitorFromPoint
CreateWindowExW
DestroyWindow
SendMessageW
SetWindowPos
GetClientRect
RedrawWindow
GetParent
GetDlgCtrlID
TrackMouseEvent
DefWindowProcW
SetWindowLongW
GetWindowLongW
CallWindowProcW
TrackPopupMenuEx
MessageBeep
PeekMessageW
SendMessageTimeoutW
GetWindowTextW
GetWindowTextLengthW
RegisterWindowMessageW
FindWindowExW
LoadIconW
AnimateWindow
GetClassNameW
IsWindow
CopyRect
GetSysColor
GetFocus
wvsprintfW
CharNextW
RegisterClassExW
LoadImageW
LoadCursorW
GetClassInfoExW
LoadAcceleratorsW
LoadMenuW
LoadStringW
DispatchMessageW
UnregisterClassA
TranslateMessage
GetMessageW
FillRect
DrawTextW
DrawEdge
SetWindowTextW
MoveWindow
BringWindowToTop
GetWindowRect
SetCapture
InvalidateRgn
ReleaseDC
GetDC
ClientToScreen
PostQuitMessage
SetForegroundWindow
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetCursor
InflateRect
SetRectEmpty
PtInRect
IsRectEmpty
GetWindow
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
KillTimer
SetTimer
IsWindowVisible
ShowWindow
InvalidateRect
ScreenToClient
gdi32
CreateSolidBrush
GetDeviceCaps
CreateCompatibleBitmap
GetStockObject
SetBkColor
ExtTextOutW
SetTextColor
SetBkMode
BitBlt
CreateDIBSection
GetObjectW
SetDIBColorTable
SelectObject
DeleteDC
CreateCompatibleDC
DeleteObject
advapi32
RegOpenKeyExW
CreateProcessAsUserW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
FreeSid
GetTokenInformation
GetSidSubAuthority
OpenProcessToken
DuplicateTokenEx
AllocateAndInitializeSid
GetLengthSid
SetTokenInformation
shell32
ShellExecuteW
ole32
OleUninitialize
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CreateStreamOnHGlobal
oleaut32
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
SysStringLen
VarUI4FromStr
SysAllocString
SysAllocStringLen
SysFreeString
DispCallFunc
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
gdiplus
GdiplusStartup
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImageGraphicsContext
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdiplusShutdown
GdipDrawImageI
GdipCloneImage
GdipGetImagePixelFormat
GdipCreateBitmapFromStream
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ