E:\WCH\AlBrowser75\jisubrowser\Release\DTLInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bcab1f290c7f3422d773c6caff5a7717_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bcab1f290c7f3422d773c6caff5a7717_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bcab1f290c7f3422d773c6caff5a7717_JaffaCakes118
-
Size
3.1MB
-
MD5
bcab1f290c7f3422d773c6caff5a7717
-
SHA1
42388bca9676584564e750ddba461d50306e8f31
-
SHA256
ff905e7400fe126d9d1450e0d9c4a322877ad3a6165f8ba4dc7c50521b53365c
-
SHA512
f9a62863958b031eac5c741d8e7f5d3b5bf4ba83fdbc3ca73e25b8ef008988394921e9b71727ad1dc9c8adacd40dc5580b7517ff3d17c281a8d0c61eafe18258
-
SSDEEP
49152:iwS4IZNXpKUOnSKje0vb5YOoRd19FTzg5zRq8urfb3MYv2JWugOIb5u53eG14XeL:i54EKVNvteP1rnbb3b+JWBneL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bcab1f290c7f3422d773c6caff5a7717_JaffaCakes118
Files
-
bcab1f290c7f3422d773c6caff5a7717_JaffaCakes118.exe windows:5 windows x86 arch:x86
58ea02c7a023f97fee8c05c66b9f5a48
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetLastError
DeleteTimerQueueTimer
GetDiskFreeSpaceExW
lstrcmpW
OutputDebugStringW
lstrcmpA
CreateToolhelp32Snapshot
GetCurrentProcess
Process32FirstW
Process32NextW
GetLogicalDriveStringsW
QueryDosDeviceW
WaitForSingleObject
TerminateProcess
GetCurrentProcessId
FindClose
GetFullPathNameW
FindFirstFileW
lstrlenW
SetFileAttributesW
DeleteFileW
FindNextFileW
RemoveDirectoryW
ExitProcess
VirtualProtect
MoveFileExW
Sleep
SetEnvironmentVariableW
LocalFree
GetCommandLineW
GetTempFileNameW
GetLogicalDrives
GetDriveTypeW
LocalAlloc
OutputDebugStringA
GetVersion
lstrcpyA
lstrcpyW
lstrlenA
MulDiv
GetProfileIntA
GlobalAlloc
GlobalLock
SetEndOfFile
WriteConsoleW
CreatePipe
GetFileAttributesExW
GetExitCodeProcess
FlushFileBuffers
ReadConsoleW
GetConsoleMode
GetConsoleCP
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
FreeResource
HeapDestroy
FindFirstFileExW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
CreateProcessA
DuplicateHandle
GetTempPathW
QueryPerformanceFrequency
GetACP
GetStdHandle
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
SetFileTime
CreateDirectoryW
FormatMessageA
GetModuleFileNameA
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
WaitForSingleObjectEx
ResetEvent
SetEvent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
GetCPInfo
GetVersionExW
InterlockedIncrement
DeleteCriticalSection
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
lstrcmpiW
GetCurrentThreadId
EnterCriticalSection
RaiseException
LeaveCriticalSection
ExpandEnvironmentStringsW
FreeLibrary
OpenProcess
MultiByteToWideChar
WideCharToMultiByte
GetLastError
CreateMutexW
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
IsValidCodePage
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
SetFilePointerEx
SetFilePointer
CloseHandle
GetFileAttributesW
WriteFile
ReadFile
CreateFileW
GetModuleFileNameW
GetModuleHandleExW
GetSystemDirectoryW
LoadLibraryW
SetCurrentDirectoryW
GetCurrentDirectoryW
LoadLibraryExW
GetModuleHandleW
HeapSize
GetProcAddress
user32
FindWindowW
SwitchToThisWindow
GetShellWindow
GetWindowThreadProcessId
LoadImageW
GetSystemMetrics
SendMessageW
SetWindowPos
SetWindowLongW
GetWindowLongW
SetWindowTextW
MapWindowPoints
GetClientRect
GetParent
GetWindowRect
GetMonitorInfoW
MonitorFromWindow
GetWindow
SetTimer
PostMessageW
IsIconic
PtInRect
GetDC
ReleaseDC
UpdateLayeredWindow
IsDialogMessageW
PostQuitMessage
GetCursorPos
ScreenToClient
SetCursor
LoadCursorW
DestroyWindow
KillTimer
EndDialog
CharNextW
DefWindowProcW
GetClassInfoW
RegisterClassW
ShowWindow
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
UnregisterClassW
CreateDialogParamW
LoadStringW
GetCaretPos
ExitWindowsEx
IsRectEmpty
GetSysColor
GetDoubleClickTime
GetDesktopWindow
GetKeyState
GetDlgItem
GetFocus
IntersectRect
InflateRect
InvalidateRect
MessageBoxW
EnableWindow
ShowScrollBar
EnableScrollBar
SetScrollRange
SetScrollPos
BringWindowToTop
GetActiveWindow
ReleaseCapture
SetCapture
UpdateWindow
OffsetRect
DestroyCursor
ClientToScreen
ScrollWindowEx
SetCaretPos
HideCaret
ShowCaret
CreateCaret
EnumWindows
gdi32
CreateRectRgn
ExtSelectClipRgn
BitBlt
GetTextMetricsW
GdiSetBatchLimit
GetDeviceCaps
DPtoLP
GetStockObject
CreateDIBSection
DeleteObject
SelectObject
CreateCompatibleDC
DeleteDC
CreateFontIndirectW
GetObjectW
advapi32
RegOpenKeyExW
SetSecurityDescriptorDacl
OpenProcessToken
ControlService
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
RegEnumValueW
RegQueryInfoKeyW
DuplicateTokenEx
InitializeSecurityDescriptor
shell32
SHFileOperationW
ShellExecuteExW
ord165
ShellExecuteW
SHGetSpecialFolderPathW
SHGetFolderPathW
SHBrowseForFolderW
SHGetPathFromIDListW
CommandLineToArgvW
ole32
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoInitialize
CoTaskMemRealloc
OleInitialize
OleUninitialize
RevokeDragDrop
RegisterDragDrop
CreateStreamOnHGlobal
CoTaskMemFree
oleaut32
SysFreeString
VarUI4FromStr
shlwapi
PathRemoveFileSpecW
SHDeleteValueW
SHSetValueW
PathGetDriveNumberW
PathRemoveBackslashW
PathFileExistsW
PathIsDirectoryW
PathIsURLW
PathCombineW
comctl32
InitCommonControlsEx
_TrackMouseEvent
msimg32
AlphaBlend
gdiplus
GdiplusStartup
GdipDeleteGraphics
GdipAlloc
GdiplusShutdown
GdipDeleteFontFamily
GdipFree
GdipFillRectangleI
GdipReleaseDC
GdipGetDC
GdipGetClipBoundsI
GdipGetImageHeight
GdipSetInterpolationMode
GdipGetInterpolationMode
GdipLoadImageFromStream
GdipDisposeImage
GdipCloneImage
GdipResetClip
GdipSetClipRect
GdipDeleteFont
GdipCreateFontFamilyFromName
GdipDrawImageRectRect
GdipGetGenericFontFamilySansSerif
GdipCreateFont
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipDrawImagePointRectI
GdipDrawString
GdipSetTextRenderingHint
GdipGetTextRenderingHint
GdipGetImageWidth
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCreateFromHDC
wintrust
WinVerifyTrust
wininet
HttpSendRequestA
InternetQueryDataAvailable
InternetReadFile
InternetSetOptionW
HttpOpenRequestA
InternetConnectA
InternetSetOptionA
InternetCrackUrlA
InternetOpenA
InternetCloseHandle
HttpAddRequestHeadersA
HttpQueryInfoA
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
psapi
GetProcessImageFileNameW
netapi32
NetApiBufferFree
NetWkstaGetInfo
imm32
ImmGetContext
ImmSetCompositionWindow
ImmReleaseContext
Sections
.text Size: 561KB - Virtual size: 561KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61.6MB - Virtual size: 61.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ