c:\Adk\Source\OfferInstaller_Resized_Current\Bootstrapper\Release\Bootstrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d592092f30150b8b68e8caa042a98d7a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d592092f30150b8b68e8caa042a98d7a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d592092f30150b8b68e8caa042a98d7a_JaffaCakes118
-
Size
625KB
-
MD5
d592092f30150b8b68e8caa042a98d7a
-
SHA1
5cc8c64ae7c9a5185a6a57fb07dfd41d33e310d0
-
SHA256
b218ffb06d52dc16219963df751709cc4aeeb7dd5155fdecdfea83e8a1788cae
-
SHA512
22fe436b80375bdc1aa38b9d3c336b1938eb0633abefb2f650f631da997a645a403834ce02158af8d7c334ffbcebb8c209411bf586fdaa13254272f3ab9abcfa
-
SSDEEP
12288:8mLvVLG8jKfvquZ7x7JYKbbavqA/U6GBmhEgE+u9WhhlMTLt00mtutpoz:8mLv1G8jKfvquZ7JJYK8qA/TGBmi+u9c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d592092f30150b8b68e8caa042a98d7a_JaffaCakes118
Files
-
d592092f30150b8b68e8caa042a98d7a_JaffaCakes118.exe windows:5 windows x86 arch:x86
2f5f917a222861d7504b2643ef3b6d3c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetTickCount
RtlUnwind
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapFree
HeapAlloc
GetDriveTypeA
GetCommandLineA
GetStartupInfoA
ExitProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitThread
CreateThread
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
GetCurrentDirectoryA
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
SetHandleCount
GetStdHandle
GetConsoleCP
GetConsoleMode
GetFileInformationByHandle
PeekNamedPipe
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
GetLocaleInfoW
CompareStringW
SetEnvironmentVariableA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedIncrement
GetModuleHandleW
LocalAlloc
DeleteCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
GlobalGetAtomNameA
GlobalFindAtomA
LoadLibraryA
lstrcmpW
GetVersionExA
FreeResource
WritePrivateProfileStringA
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
GlobalAddAtomA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
GetProcAddress
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
MulDiv
lstrcpynA
CreateProcessA
EnterCriticalSection
LeaveCriticalSection
FormatMessageA
InitializeCriticalSection
WriteFile
DeleteFileA
GetTempFileNameA
CreateFileA
CreateDirectoryA
lstrlenA
WaitForSingleObject
GetModuleHandleA
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetModuleFileNameA
RemoveDirectoryA
Sleep
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
GetExitCodeProcess
TerminateProcess
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
CloseHandle
CreateMutexA
GetACP
GetLastError
CreateFileW
user32
RegisterClipboardFormatA
PostThreadMessageA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
DeferWindowPos
DefWindowProcA
CallWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
SetWindowContextHelpId
MapDialogRect
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
IsWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetWindow
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
MessageBoxA
ShowOwnedPopups
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CloseWindow
KillTimer
SetTimer
LoadImageA
PostMessageA
GetDC
ReleaseDC
SetForegroundWindow
BringWindowToTop
UpdateWindow
UnpackDDElParam
ReuseDDElParam
LoadMenuA
SetActiveWindow
GetSystemMetrics
LoadStringA
CreateWindowExA
LoadCursorA
SetCursor
LoadIconA
EnableWindow
InvalidateRect
GetClientRect
GetWindowRect
IsIconic
SendMessageA
DrawIcon
GetMenuItemInfoA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
PtInRect
CopyRect
UnregisterClassA
SetCapture
GetSysColorBrush
GetWindowLongA
DestroyMenu
ReleaseCapture
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
TranslateAcceleratorA
InflateRect
CharUpperA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
UnhookWindowsHookEx
GetTopWindow
gdi32
SetTextColor
SetMapMode
GetClipBox
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
GetStockObject
CreateSolidBrush
CreateFontIndirectA
CreateRectRgnIndirect
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
GetTextExtentPoint32A
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
SetStretchBltMode
StretchBlt
CreateCompatibleBitmap
GetDeviceCaps
GetCurrentObject
GetObjectA
CreateCompatibleDC
SelectObject
SetWindowExtEx
DeleteObject
BitBlt
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegCloseKey
RegEnumKeyA
RegDeleteKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetFolderPathA
Shell_NotifyIconA
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
UrlUnescapeA
SHDeleteKeyA
oledlg
ord8
ole32
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysStringLen
SysAllocStringByteLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
urlmon
URLDownloadToFileA
wininet
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetQueryDataAvailable
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
Sections
.text Size: 453KB - Virtual size: 452KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ