C:\DistributedAutoLink\Temp\CompileOutputDir\RavD.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bf7c8cd2c1336061661012dcc63cfe97_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf7c8cd2c1336061661012dcc63cfe97_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf7c8cd2c1336061661012dcc63cfe97_JaffaCakes118
-
Size
188KB
-
MD5
bf7c8cd2c1336061661012dcc63cfe97
-
SHA1
d059c8e3feb40f10b4fcd039ccfacb0969166e5e
-
SHA256
9b25181a90ae4a9fedb8fd2169c0cc092cfd17629003696f2d3f0ec769ff13f6
-
SHA512
21880ca2cce7a2832274dbe028c566ba810db92f079292973ce5f4c77e9e729e3afd1b43363bf63fd709366a7e692e65cea320c7d9648587e6a1a2a38d2a696a
-
SSDEEP
3072:Spr2sYv8lbw0rqMwoacsJ4B38Ty0CtSpbuLKR+3RUE3wLTrkiJjlAT9:2rF2wbw80is88TQtSpbuLwQM07R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf7c8cd2c1336061661012dcc63cfe97_JaffaCakes118
Files
-
bf7c8cd2c1336061661012dcc63cfe97_JaffaCakes118.exe windows:4 windows x86 arch:x86
ad6c2e9f1f2df8e3bef5451ea4eeb538
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameA
GetModuleHandleA
GetLastError
CreateDirectoryA
lstrcpynA
SetLastError
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
WideCharToMultiByte
MoveFileA
SetFileAttributesA
lstrcmpiA
CloseHandle
FlushFileBuffers
WriteFile
SetEndOfFile
SetFilePointer
SetFileTime
SystemTimeToFileTime
CreateFileA
DeleteFileA
FileTimeToSystemTime
FindClose
FindFirstFileA
GetLocalTime
lstrcatA
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
IsBadReadPtr
Sleep
FlushInstructionCache
GetCurrentProcess
HeapFree
GetProcessHeap
HeapAlloc
InterlockedIncrement
InterlockedDecrement
ReleaseMutex
CreateMutexA
lstrlenW
MultiByteToWideChar
LoadLibraryExA
IsDBCSLeadByte
GetPrivateProfileIntA
GetPrivateProfileStringA
GetCommandLineA
ReadFile
ResumeThread
SuspendThread
GetFileSize
GetCurrentProcessId
OutputDebugStringA
GetTickCount
WaitForSingleObject
CreateProcessA
GetTempPathA
GetWindowsDirectoryA
GetVersion
lstrcmpiW
CompareStringA
CompareStringW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetStringTypeExA
GetStringTypeExW
RemoveDirectoryA
FindNextFileA
GetDiskFreeSpaceA
CopyFileA
GetLocaleInfoW
GetTimeZoneInformation
SetConsoleCtrlHandler
SetStdHandle
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
IsBadCodePtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
TerminateProcess
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
TlsAlloc
SetEnvironmentVariableA
IsBadWritePtr
FatalAppExitA
VirtualFree
HeapCreate
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoA
CreateThread
ExitThread
VirtualQuery
GetSystemInfo
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
LoadLibraryA
GetProcAddress
GlobalAlloc
GlobalFree
lstrlenA
lstrcpyA
VirtualAlloc
VirtualProtect
ExitProcess
RtlUnwind
HeapSize
HeapReAlloc
HeapDestroy
GetFileAttributesA
FreeLibrary
user32
IsWindow
SendMessageA
DestroyWindow
LoadMenuA
ModifyMenuA
DestroyMenu
GetWindowLongA
MessageBoxA
IsDialogMessageA
SetWindowPos
MapWindowPoints
GetClientRect
SystemParametersInfoA
GetWindowRect
GetWindow
GetParent
PostQuitMessage
wsprintfA
LoadImageA
GetSystemMetrics
PostMessageA
TrackPopupMenu
SetForegroundWindow
GetCursorPos
DestroyIcon
LoadIconA
SetWindowLongA
ShowWindow
DispatchMessageA
TranslateMessage
PeekMessageA
CreateDialogParamA
DefWindowProcA
CharNextA
CharUpperA
FindWindowA
UnregisterClassA
GetSubMenu
CharUpperW
CharLowerW
CharLowerA
wvsprintfA
GetMessageA
advapi32
RegDeleteValueA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
Shell_NotifyIconA
ole32
CoInitialize
CoTaskMemFree
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
oleaut32
SysFreeString
VarUI4FromStr
shlwapi
PathFileExistsA
PathRemoveFileSpecA
PathSkipRootA
comctl32
InitCommonControlsEx
wsock32
closesocket
WSAStartup
WSACleanup
htons
inet_addr
htonl
ntohs
socket
WSAGetLastError
connect
recv
select
send
ioctlsocket
wininet
InternetAttemptConnect
InternetCloseHandle
InternetOpenA
InternetConnectA
HttpAddRequestHeadersA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCrackUrlA
InternetSetOptionA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ