d:\Proiecte\nBinder\unBin\unBin3\Unbin3\Unbin3\Release\Unbin3.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d144276564e42a5f6e5659c239c44084_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d144276564e42a5f6e5659c239c44084_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d144276564e42a5f6e5659c239c44084_JaffaCakes118
-
Size
494KB
-
MD5
d144276564e42a5f6e5659c239c44084
-
SHA1
d9c984a7e14fb1a0286f60f9a48edd27c1b637b8
-
SHA256
bbd6ab9b45768fc524009df808635974bead3e79d887de6fd73fc84ac9c7dac6
-
SHA512
05a6e17c56d95cba81e44e8c93448e1f2c60db82213092f443a157a34bbc5528b0b75618544278b28886727cd81d4aadfacf2a9d88d273822f39ae7b3762f0d3
-
SSDEEP
6144:wWt1qBqBc0Agdj4Xz3c1OsOIZmwtweGUfT3w8M7pvi0hTaKohdS7b6l+RGY12Ak7:nt1qBKd24XdZmowMNCvi0TeXS71ZUAk7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d144276564e42a5f6e5659c239c44084_JaffaCakes118
Files
-
d144276564e42a5f6e5659c239c44084_JaffaCakes118.exe windows:4 windows x86 arch:x86
b6c35660aba66711d566b0d0dba602a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
TerminateProcess
GetStartupInfoA
RtlUnwind
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
SetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
SetEnvironmentVariableA
IsBadReadPtr
IsBadCodePtr
GetDriveTypeA
FileTimeToLocalFileTime
SetErrorMode
GetOEMCP
GetCPInfo
GetFullPathNameA
FindFirstFileA
FindClose
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentDirectoryA
WritePrivateProfileStringA
FileTimeToSystemTime
GlobalFlags
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
DeleteCriticalSection
InitializeCriticalSection
RaiseException
InterlockedDecrement
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
FreeResource
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
LoadLibraryA
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
SetLastError
lstrcpynA
lstrcpyA
DeleteFileA
GetTempPathA
CloseHandle
GetModuleFileNameA
LockResource
MoveFileA
RemoveDirectoryA
GetLongPathNameA
CreateDirectoryA
GetShortPathNameA
lstrcatA
CreateProcessA
SizeofResource
GetCommandLineA
WaitForSingleObject
LoadResource
MoveFileExA
FindResourceA
CreateFileA
GetVersion
GetVersionExA
CompareStringA
GetThreadLocale
lstrcmpiA
GetLastError
InterlockedExchange
MultiByteToWideChar
GetACP
CompareStringW
GetEnvironmentVariableA
WideCharToMultiByte
GetLocaleInfoA
lstrlenA
UnhandledExceptionFilter
user32
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetClientRect
GetMenu
GetSysColor
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowRect
CopyRect
PtInRect
GetWindow
GetDesktopWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
MessageBoxA
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
PostMessageA
PostQuitMessage
SetMenuItemBitmaps
GetFocus
GetParent
SendMessageA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
LoadIconA
EnableWindow
GetWindowPlacement
DestroyMenu
LoadCursorA
GetSysColorBrush
ShowWindow
SetWindowTextA
IsDialogMessageA
SetWindowPos
EndPaint
GetClassInfoExA
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
DeleteObject
GetStockObject
CreateSolidBrush
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetFolderPathA
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantInit
VariantChangeType
VariantClear
Exports
Exports
??0CMamaZip@@QAE@ABV0@@Z
??0CMamaZip@@QAE@PBD@Z
??0CUnzip@@QAE@ABV0@@Z
??0CUnzip@@QAE@PBD@Z
??0CZip@@QAE@ABV0@@Z
??0CZip@@QAE@PBD@Z
??0CZipException@@QAA@PBDZZ
??4CMamaZip@@QAEAAV0@ABV0@@Z
??4CUnzip@@QAEAAV0@ABV0@@Z
??4CZip@@QAEAAV0@ABV0@@Z
??4CZipException@@QAEAAV0@ABV0@@Z
??_7CMamaZip@@6B@
??_7CUnzip@@6B@
??_7CZip@@6B@
?GetString@CZipException@@QAEPBDXZ
?HardWork@CUnzip@@MAEHHH@Z
?HardWork@CZip@@MAEHHH@Z
?SwapSize@CMamaZip@@QAEXPBD@Z
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ