d:\BldArea\build-8.2.13\build\bin\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cf1429ffe249b9cbfc25faae6bb57a3e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cf1429ffe249b9cbfc25faae6bb57a3e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf1429ffe249b9cbfc25faae6bb57a3e_JaffaCakes118
-
Size
750KB
-
MD5
cf1429ffe249b9cbfc25faae6bb57a3e
-
SHA1
8968fadba625705781cffa5a6af709ab51433cef
-
SHA256
8cb16df1b8bdc07c1d52b6d51be66f73f60e54a0ae5b2d0a38365aada70ddf35
-
SHA512
65f6befc175b05e019cf1895580300a1a2f3267b7be680ecec698f314334e47e5cd397eb2fa179c6804100d1c02fb8f64148a2386798d043625a04b40b787ecf
-
SSDEEP
12288:8GfAZA0aZPGlXaX/LMGxNaZcE2lcFkTsxzf1zRlPKkTXjoXRpLf3UR78Jnx6Ep/x:aZARZPGEuCE8cKTiz9zREpLvfa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf1429ffe249b9cbfc25faae6bb57a3e_JaffaCakes118
Files
-
cf1429ffe249b9cbfc25faae6bb57a3e_JaffaCakes118.exe windows:5 windows x86 arch:x86
c85b21f248c012aeaf6e7862e94b03c1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mpr
WNetGetUniversalNameW
kernel32
GetCurrentProcess
lstrlenA
SetErrorMode
GetStartupInfoW
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
ExitThread
CreateThread
RaiseException
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
FlushFileBuffers
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
GetConsoleCP
GetConsoleMode
CreateFileA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringW
GetModuleHandleA
FreeResource
GlobalFindAtomW
LoadLibraryA
GetVersionExA
ReleaseMutex
CreateMutexW
InterlockedDecrement
FormatMessageW
LocalFree
lstrlenW
MulDiv
GetCurrentProcessId
GlobalAddAtomW
CreateEventW
SetEvent
SetThreadPriority
SetLastError
GlobalUnlock
GlobalFree
VirtualProtect
GlobalDeleteAtom
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
FindResourceW
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
FreeLibrary
SetFileTime
SetEndOfFile
GetCurrentThread
GetFileTime
Sleep
SuspendThread
ResumeThread
GetExitCodeThread
WaitForSingleObject
GetModuleFileNameW
MapViewOfFile
CreateFileMappingW
SetFilePointer
GetDiskFreeSpaceExW
CloseHandle
GetFileSizeEx
DeleteFileW
MoveFileW
CreateFileW
RemoveDirectoryW
CreateDirectoryW
GetTempFileNameW
GetTempPathW
FindNextFileW
FindFirstFileW
FindClose
InterlockedCompareExchange
FindResourceExW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
GetProcAddress
LoadLibraryW
GetModuleHandleW
GetVersionExW
ReadFile
GetLastError
WriteFile
GetUserDefaultLangID
lstrcmpiW
SetHandleCount
user32
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
GetClientRect
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
ScreenToClient
DefWindowProcW
CallWindowProcW
CopyRect
PtInRect
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
MoveWindow
SetWindowLongW
GetDlgCtrlID
IsWindow
IsDialogMessageW
SendDlgItemMessageW
GetWindow
UnhookWindowsHookEx
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
GetLastActivePopup
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
SetPropW
GetCapture
GetActiveWindow
SetActiveWindow
MapDialogRect
SetWindowPos
ShowWindow
GetPropW
RemovePropW
GetAsyncKeyState
GetFocus
SetWindowTextW
GetWindowTextLengthW
GetWindowTextW
SetFocus
GetWindowLongW
GetDlgItem
IsWindowEnabled
PostQuitMessage
EnableWindow
SetRect
GetWindowRect
GetParent
PostMessageW
SetTimer
KillTimer
LoadIconW
MessageBoxW
SendMessageW
DestroyMenu
UnregisterClassW
LoadCursorW
GetSysColorBrush
GetDesktopWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetClassLongW
GetClassNameW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
gdi32
DeleteObject
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
DeleteDC
GetStockObject
EnumFontFamiliesExW
SetMapMode
RestoreDC
SaveDC
GetObjectW
SetBkColor
GetDeviceCaps
CreateBitmap
SetTextColor
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegQueryValueW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteW
comctl32
ord17
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
PathFindExtensionW
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemFree
oleaut32
VariantInit
VariantChangeType
VariantClear
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE