D:\アプリ\POLA\POLA_2011\細胞面積分析\PL_CellSizeAnlz_v1.0.9_20120310\prj\Release\PL_CellSizeAnlz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c86e36011b8ccbb085cca7c873625bb9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c86e36011b8ccbb085cca7c873625bb9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c86e36011b8ccbb085cca7c873625bb9_JaffaCakes118
-
Size
118KB
-
MD5
c86e36011b8ccbb085cca7c873625bb9
-
SHA1
ada24b2447129ee9830ef0c594c3b2521ced2483
-
SHA256
383b2cfca850d1fb920f76f68fcd59c6e31b1a1ff8a131ab4c4adb1b78f16c7d
-
SHA512
f6397908e29b124c17ea82231b5220bedfdbe286a1377fc8c4b82c7b7c854a603fa690bd7fff0a324ca05b84b4058c057bfd819b337892d02158a473b36df838
-
SSDEEP
1536:gxvIsqQhTmwUkGQ93TyMN4SUjI6OH2P5nCwm6Pq/AqxyIQmjy+lX5Ff0uUVO:W9qQUwwQRNcHcMd2ZQmjy+lfo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c86e36011b8ccbb085cca7c873625bb9_JaffaCakes118
Files
-
c86e36011b8ccbb085cca7c873625bb9_JaffaCakes118.exe windows:5 windows x86 arch:x86
2a231cf3d82548f0f72bb8651f6251a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
iaxcmds
?IA_DestroyIPointTbl@@YAHPAU_IA_IPointTbl@@@Z
?IA_Eval_EnableUserButtonA@@YAHP6AHXZQAD@Z
?IA_DrawCursor@@YAHHU_IA_PointF@@W4IA_Cursor_Shape@@HW4IA_Draw_Mode@@@Z
?IA_RenewalLblImg@@YAHHPAUIA_Object@@@Z
?IA_JpegFile_Save@@YAHHPADH@Z
?IA_Eval_EnableDisp@@YAHXZ
?IA_JpegFile_Load@@YAHHPAD@Z
?IA_Eval_RegisterExec@@YAHP6AHXZ@Z
?IA_View_GetMultiPoints@@YAHQAU_IA_View_GetPointTbl@@@Z
?IA_Eval_Enable_MultiPort@@YAHHH@Z
?IA_Eval_SaveIniFile@@YAHQAD@Z
?IA_FreeImg@@YAHH@Z
?IA_Clear@@YAHH@Z
?IA_Eval_EnableBatch@@YAHXZ
?IA_CopyG@@YAHHH@Z
?IA_Eval_View_RefreshDisp@@YAHXZ
?IA_Erosion@@YAHHHPAUIA_BinFilterCtl@@@Z
?IA_DetectObject@@YAHHHHPAUIA_Object@@PAUIA_ObjectCtl@@@Z
?IA_SetDrawColor@@YAHHHH@Z
?IA_GetTime@@YAHH@Z
?IA_MaxFilterDisc@@YAHHHPAUIA_FilterCtl@@@Z
?IA_Eval_SetBatchFileName@@YAHQAD@Z
?IA_ReadImg@@YA?AU_IA_Img@@H@Z
?IA_ReAllocImg@@YAHHW4IA_ImgType@@PAU_IA_Size@@@Z
?IA_Reshape@@YAHHHPAUIA_BinFilterCtl@@@Z
?IA_Eval_CtlDlg_SetRowNum@@YAHH@Z
?IA_Eval_SetImgDispCtl@@YAHHPAUIA_Eval_ImgDispCtl@@@Z
?IA_Eval_InsertComment@@YAHQAD0@Z
?IA_EnableErrorMessage@@YAHH@Z
?IA_ResetWin@@YAHXZ
?IA_Extract_ObjAxis@@YAHHPAUIA_Features@@HPAM111@Z
?IA_GetVideo_ReadInfo@@YAHHPAU_IA_GetVideo_Ctl@@@Z
?IA_Eval_SetParamReadOnly@@YAHPAXH@Z
?IA_Sobel@@YAHHHPAUIA_FilterCtl@@@Z
?IA_Copy@@YAHHH@Z
?IA_Eval_Disable@@YAHXZ
?IA_Eval_fParamChanged@@YAHXZ
?IA_Eval_RegisterParam@@YAHPAHQAD1HHHH1P6AHXZW4IA_Eval_ParamCtlType@@1@Z
?IA_Eval_RegisterParam@@YAHPAMQAD1HHMM1P6AHXZ@Z
?IA_MinFilterDisc@@YAHHHPAUIA_FilterCtl@@@Z
?IA_PackObjAndLblImg@@YAHHPAUIA_Object@@@Z
?IA_Eval_LoadIniFile@@YAHQAD@Z
?IA_Binarize@@YAHHHPAUIA_BinarizeCtl@@@Z
?IA_AllocImg@@YAHW4IA_ImgType@@PAU_IA_Size@@QAD@Z
?IA_EnableGetTime@@YAHHHHH@Z
?IA_Close@@YA?AU_IA_SYS_INFO@@XZ
?IA_SpatialFilter@@YAHHHPAUIA_FilterCtl@@@Z
?IA_DrawObj@@YAHHHW4IA_Draw_Mode@@PAUIA_Object@@@Z
?IA_AllocSameImg@@YAHH@Z
?IA_Eval_SetDispImgName@@YAHHQAD@Z
?IA_Eval_CreateWindow@@YAHW4IA_Eval_ViewSize@@W4IA_Eval_ViewNum@@W4IA_Eval_TextBoxLayout@@HPADH@Z
?IA_And@@YAHHHH@Z
?IA_GetHist@@YAHHPAUIA_Hist@@PAUIA_HistCtl@@@Z
?IA_Eval_SetText@@YAHQAD@Z
?IA_Eval_GetSrcImgParam@@YAHPAUIA_Eval_SrcImgParam@@@Z
?IA_CreateIPointTbl@@YAHHPAU_IA_IPointTbl@@@Z
?IA_Eval_View_SetIPointTbl@@YAHHPAU_IA_IPointTbl@@PAU_IA_DispIPointCtl@@@Z
?IA_Open@@YA?AU_IA_SYS_INFO@@XZ
?IA_DrawCircle@@YAHHU_IA_PointF@@MHHW4IA_Draw_Mode@@@Z
?IA_ZoomBilinear@@YAHHH@Z
kernel32
CopyFileA
CreateFileW
GetLastError
HeapFree
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
DecodePointer
HeapCreate
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
RtlUnwind
CloseHandle
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
SetFilePointer
GetConsoleCP
GetConsoleMode
LoadLibraryW
ReadFile
CreateFileA
SetStdHandle
FlushFileBuffers
HeapReAlloc
IsProcessorFeaturePresent
LCMapStringW
GetStringTypeW
WriteConsoleW
HeapSize
SetEndOfFile
GetProcessHeap
RaiseException
user32
TranslateMessage
MessageBoxA
DispatchMessageA
GetMessageA
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 922KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ