C:\BuildAgent\work\f2191ca26f3cc087\Release\Extractor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c220c8dc90e44c7d0e45953171bf3e82_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c220c8dc90e44c7d0e45953171bf3e82_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c220c8dc90e44c7d0e45953171bf3e82_JaffaCakes118
-
Size
3.1MB
-
MD5
c220c8dc90e44c7d0e45953171bf3e82
-
SHA1
a2fbd7065ce53fb447bce3534fc80d5ce38fcc56
-
SHA256
45627c4cbaa632d4108b8fdb65e0a159edffeeb583d65757b9f5e39f95fe99d2
-
SHA512
a2643d25e1fbfc0c54b44f16717c10f4a466ef64b1fed4d331c5ac848b5bcc6e71840821caa39878a13a603b00aefd4bc579572f4e2c0ef7b17595e77a957e69
-
SSDEEP
98304:xIBDB50DOmo4KgIILdi8dZInfXVmOztwpYeyx:xIB/7sLU8dZINmOztwg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c220c8dc90e44c7d0e45953171bf3e82_JaffaCakes118
Files
-
c220c8dc90e44c7d0e45953171bf3e82_JaffaCakes118.exe windows:6 windows x86 arch:x86
d2ef56dba5c37e874f6c5faca267401f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
WSAStartup
getaddrinfo
WSASocketW
WSASetLastError
send
connect
gethostname
recv
freeaddrinfo
setsockopt
WSAGetLastError
inet_ntop
htonl
WSACleanup
closesocket
WSASend
shutdown
wininet
HttpSendRequestA
InternetReadFile
InternetConnectA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetOpenA
InternetCloseHandle
iphlpapi
GetAdaptersAddresses
shlwapi
PathFileExistsA
version
VerQueryValueA
GetFileVersionInfoSizeExW
GetFileVersionInfoExW
gdiplus
GdipFree
GdipAlloc
GdipCloneImage
GdipDisposeImage
GdipGetImageWidth
GdipGetImageHeight
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreatePen1
GdipDeletePen
GdipDrawRectangleI
GdipDrawImageRectI
GdiplusStartup
GdiplusShutdown
GdipCreateBitmapFromStream
kernel32
FindClose
HeapReAlloc
GetTimeZoneInformation
ReadConsoleW
SetEndOfFile
MoveFileExW
DeleteFileW
CreateDirectoryW
GetCurrentDirectoryW
SetFilePointerEx
FindFirstFileExA
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
GetCommandLineW
GetCommandLineA
GetModuleFileNameA
ExitThread
SetStdHandle
FlushFileBuffers
FreeLibraryAndExitThread
FreeLibrary
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
CreateFileW
GetFullPathNameA
GetFullPathNameW
GetDriveTypeW
GetModuleHandleExW
ExitProcess
RtlUnwind
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
SetFilePointer
SystemTimeToFileTime
GetFileAttributesA
CreateFileA
CloseHandle
ReadFile
GetCurrentDirectoryA
LocalFileTimeToFileTime
CreateDirectoryA
WriteFile
SetFileTime
GetModuleHandleA
FindResourceA
FindNextFileA
LoadResource
LockResource
LocalAlloc
FreeResource
LocalFree
HeapAlloc
GetProcessHeap
HeapFree
FormatMessageA
GetLastError
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
MulDiv
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetStdHandle
OutputDebugStringA
FlsSetValue
QueryPerformanceFrequency
QueryPerformanceCounter
FlsFree
FlsAlloc
IsDebuggerPresent
GetCurrentThreadId
Sleep
SwitchToThread
WriteConsoleA
GetConsoleMode
GetFileType
AllocConsole
GetCurrentProcessId
GetCurrentProcess
UnlockFile
LockFileEx
VerifyVersionInfoA
VerSetConditionMask
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SignalObjectAndWait
CreateTimerQueue
GetStartupInfoW
InitializeSListHead
ResetEvent
SetEvent
IsProcessorFeaturePresent
TerminateProcess
VirtualProtect
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
HeapSize
WriteConsoleW
SizeofResource
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
VirtualAlloc
GetVersionExW
LoadLibraryExW
FormatMessageW
WideCharToMultiByte
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetExitCodeThread
GetNativeSystemInfo
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
GetModuleFileNameW
user32
TranslateMessage
GetMessageA
ShowWindow
DefWindowProcA
PostQuitMessage
SendMessageA
SetWindowLongA
FillRect
DispatchMessageA
CreateWindowExA
GetWindowLongA
SetWindowPos
GetWindowRect
GetDesktopWindow
GetSystemMetrics
GetDialogBaseUnits
LoadStringA
MessageBoxA
BeginPaint
RegisterClassA
EndPaint
advapi32
DeregisterEventSource
RegCloseKey
RegCreateKeyExA
CopySid
ReportEventA
RegSetValueExA
OpenProcessToken
GetLengthSid
RegisterEventSourceA
GetTokenInformation
shell32
SHGetFileInfoA
ShellExecuteExA
SHFileOperationA
ole32
CreateStreamOnHGlobal
CoCreateGuid
Sections
.text Size: 882KB - Virtual size: 881KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ