D:\sst\proj\cer\client\windows\develop\Win32\Release\senddmp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b8e8846f6f6ca65d0ba0e075a4de0c1e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8e8846f6f6ca65d0ba0e075a4de0c1e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8e8846f6f6ca65d0ba0e075a4de0c1e_JaffaCakes118
-
Size
630KB
-
MD5
b8e8846f6f6ca65d0ba0e075a4de0c1e
-
SHA1
3ab1462bbf6ac13a183b6e84abbb59edefdee74c
-
SHA256
9356732e1ef39f0bcc8ff3f05934d6fd13c1d4fc9cf884bba6c39ed0c784c055
-
SHA512
7da19bc8934be9f01fa2cd4061bd6162c4137289d87ac6f160300c44ef1c8516f488f3fb0c6f3a8bba814e8078131d7fa98989141490746f1f03bf363c209c67
-
SSDEEP
12288:mX0oqHbAf4714GzXGSyQU4kfrmXFZY2yDEcLyn7OpkC:mXzqHbBRHXGSKrmXFC2yAaZCC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8e8846f6f6ca65d0ba0e075a4de0c1e_JaffaCakes118
Files
-
b8e8846f6f6ca65d0ba0e075a4de0c1e_JaffaCakes118.exe windows:5 windows x86 arch:x86
2d35c634543eb1367523d51521310487
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCanonicalizeUrlW
InternetErrorDlg
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestExW
InternetWriteFile
HttpEndRequestW
InternetReadFile
InternetCloseHandle
InternetCrackUrlW
HttpQueryInfoW
opengl32
wglCreateContext
glGetString
glGetError
wglDeleteContext
wglMakeCurrent
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
kernel32
EnterCriticalSection
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
InterlockedExchange
CompareStringA
lstrcmpA
EnumResourceLanguagesW
ConvertDefaultLocale
GetCurrentThread
SetThreadPriority
SuspendThread
GetFileAttributesW
GetFileSizeEx
GetFileTime
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
SetErrorMode
WritePrivateProfileStringW
GetTickCount
DeleteCriticalSection
ExitThread
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
Sleep
ExitProcess
SetStdHandle
GetFileType
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
InitializeCriticalSection
FileTimeToLocalFileTime
InterlockedDecrement
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetModuleHandleA
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
SetLastError
FormatMessageW
LocalFree
GetThreadLocale
InterlockedIncrement
UnmapViewOfFile
WriteFile
lstrcmpiW
GetFileInformationByHandle
SetFilePointer
SystemTimeToFileTime
FileTimeToSystemTime
CreateThread
OpenProcess
LoadLibraryExW
GetEnvironmentVariableW
lstrcpyW
GetModuleFileNameW
IsDBCSLeadByte
GetNativeSystemInfo
FreeLibrary
GetTempPathW
GetProcAddress
LoadLibraryW
GetModuleHandleW
GetDateFormatW
GetLocalTime
GetComputerNameW
GetLocaleInfoW
GetVersionExW
GetUserDefaultLangID
GetSystemDirectoryW
DeleteFileW
GetUserDefaultLCID
lstrlenA
ReadFile
WideCharToMultiByte
lstrlenW
GetFileSize
CreateFileW
GetLastError
ResetEvent
SetEvent
WaitForSingleObject
LockResource
FreeResource
SizeofResource
LoadResource
FindResourceW
GlobalAlloc
ResumeThread
GlobalFree
MulDiv
GlobalUnlock
GlobalLock
CloseHandle
CreateEventW
MultiByteToWideChar
GetStartupInfoW
InterlockedCompareExchange
user32
IsRectEmpty
InvalidateRgn
GetSysColorBrush
UnregisterClassW
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatW
PostThreadMessageW
CheckMenuItem
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
GetKeyState
SetMenu
GetClassInfoExW
AdjustWindowRectEx
EqualRect
CallWindowProcW
GetMenu
IntersectRect
SystemParametersInfoA
CopyAcceleratorTableW
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
GetMenuState
TabbedTextOutW
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowTextLengthW
GetWindowTextW
SetWindowPos
SetFocus
IsWindowEnabled
MoveWindow
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
GetDlgItem
GetWindowLongW
GetDlgCtrlID
GetWindow
CharNextW
DrawIcon
GetSystemMetrics
IsIconic
EnableMenuItem
GetSystemMenu
LoadImageW
SetForegroundWindow
MessageBoxW
EnumDisplayDevicesW
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassW
LoadIconW
PostQuitMessage
EndPaint
BeginPaint
MapWindowPoints
PostMessageW
ScreenToClient
WindowFromPoint
ClientToScreen
GetFocus
IsWindowVisible
DefWindowProcW
GetClassInfoW
UpdateWindow
SetTimer
KillTimer
LoadCursorW
InflateRect
GetParent
GetWindowRect
IsWindow
SetWindowLongW
SetCursor
DestroyMenu
SetWindowContextHelpId
MapDialogRect
SetCapture
RedrawWindow
GetMessageW
TranslateMessage
ValidateRect
GetCursorPos
GetWindowThreadProcessId
CharUpperW
GetWindowDC
GrayStringW
GetWindowPlacement
DrawTextExW
ReleaseCapture
PtInRect
GetDesktopWindow
CopyRect
FillRect
ReleaseDC
GetDC
SetRect
DrawTextW
GetSysColor
SendMessageW
OffsetRect
GetClientRect
InvalidateRect
EnableWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
gdi32
GetTextColor
GetClipBox
SetTextColor
SetBkColor
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
GetBkColor
SetPixelFormat
ExtSelectClipRgn
CreatePen
CreateRectRgnIndirect
GetMapMode
GetRgnBox
CreateFontW
ScaleWindowExtEx
DescribePixelFormat
MoveToEx
ChoosePixelFormat
Ellipse
GetTextExtentPoint32W
CreateFontIndirectW
GetObjectW
GetStockObject
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
CreateSolidBrush
DeleteObject
DeleteDC
GetDeviceCaps
SelectObject
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
comdlg32
GetOpenFileNameW
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegQueryValueW
RegEnumKeyW
RegOpenKeyW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
shell32
ShellExecuteW
comctl32
ord17
shlwapi
PathIsUNCW
PathAppendW
UrlUnescapeW
PathFindExtensionW
PathFindFileNameW
SHRegGetValueW
PathStripToRootW
oledlg
OleUIBusyW
ole32
CLSIDFromString
CoDisconnectObject
CreateStreamOnHGlobal
CoInitialize
CoCreateInstance
CoUninitialize
CoInitializeEx
CoCreateGuid
StringFromGUID2
CoTaskMemFree
CoTaskMemAlloc
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromProgID
oleaut32
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocString
VariantCopy
VariantChangeType
SysFreeString
OleCreateFontIndirect
SysAllocStringLen
SysStringLen
VariantClear
VariantInit
LoadTypeLi
OleLoadPicture
Sections
.text Size: 396KB - Virtual size: 396KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.prdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE