d:\Work\Popuper\Release\Main.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d42a0078dae70e6730197437a878366e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d42a0078dae70e6730197437a878366e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d42a0078dae70e6730197437a878366e_JaffaCakes118
-
Size
180KB
-
MD5
d42a0078dae70e6730197437a878366e
-
SHA1
7e756a3b0bad41b1330d69213ddcb324f7e89bdf
-
SHA256
9b922f1c5e79a147a94cf2cfb192e2986eecc8b3a8585786c25c604549d94955
-
SHA512
7d0a05d2aeab98410ebb84476e19f3b93388a393243ad62928d77f4f657d29134ae1eac321e285046ff2ddc16832378abac52ad557ba991afa0299ddfd2770a0
-
SSDEEP
3072:4etMSoILkJ+rrq3P4plzNavCpMMeZrqiids2Tnl1+60DO:JKSoPKrwP2lzcKbe3iW6z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d42a0078dae70e6730197437a878366e_JaffaCakes118
Files
-
d42a0078dae70e6730197437a878366e_JaffaCakes118.exe windows:4 windows x86 arch:x86
c4f8d7d29fc70c4d103b065b21668293
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FlushFileBuffers
GetCurrentProcess
SetErrorMode
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
TerminateProcess
HeapSize
SetFilePointer
GetTickCount
GetCurrentProcessId
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
IsBadReadPtr
IsBadCodePtr
SetStdHandle
WritePrivateProfileStringA
RaiseException
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
GetLastError
OpenEventA
CreateEventA
MultiByteToWideChar
GetModuleFileNameA
WriteFile
ReadFile
CreateFileA
GetFileSize
GetTempPathA
CreateThread
InterlockedDecrement
WideCharToMultiByte
TerminateThread
CloseHandle
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
QueryPerformanceCounter
InterlockedExchange
user32
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ClientToScreen
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsWindowEnabled
SetWindowTextA
GetMenuState
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
CallNextHookEx
GetSysColorBrush
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
PostMessageA
SetTimer
EnableWindow
ShowWindow
GetWindowRect
GetDesktopWindow
SendMessageA
GetClassNameA
MessageBoxA
GetKeyState
IsWindowVisible
GetClientRect
GetMenu
LoadCursorA
wsprintfA
GetSubMenu
GetMenuItemID
GetClassLongA
EnumChildWindows
SetForegroundWindow
GetWindow
PtInRect
CopyRect
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetWindowPos
SetWindowLongA
GetWindowLongA
CallWindowProcA
DefWindowProcA
GetDlgCtrlID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
GetParent
GetClassInfoA
RegisterClassA
UnregisterClassA
SetWindowsHookExA
gdi32
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
RectVisible
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
GetStockObject
PtVisible
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
DeleteObject
CreateBitmap
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
TextOutA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
ole32
CoUninitialize
OleRun
CoCreateInstance
CoDisconnectObject
CoInitialize
oleaut32
SysFreeString
VariantClear
SysAllocStringByteLen
SysStringByteLen
VariantInit
SysAllocString
SysAllocStringLen
VariantChangeType
SysStringLen
VariantCopy
LoadTypeLi
GetErrorInfo
wininet
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
InternetOpenA
InternetReadFile
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ