d:\Temple\Release\Launch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dc47486253a14a2a9f7c8ee9851f6538_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dc47486253a14a2a9f7c8ee9851f6538_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc47486253a14a2a9f7c8ee9851f6538_JaffaCakes118
-
Size
1.5MB
-
MD5
dc47486253a14a2a9f7c8ee9851f6538
-
SHA1
0a7f6fc82d50570fdf9e00ea1a70c0b8bba79c91
-
SHA256
55e8c46c07e61a0eb048cb503928c946b4c1f6d4b85765a354fb05d619c4f9d8
-
SHA512
f6550de18d65a7b91ca8e025ba8aa994b48935ecc55afe5046927191601ecc3faef32b744628336add026f771a0648beb508d5ece5b1b4ac599a5bfd0ed9b490
-
SSDEEP
24576:HPK9oCBt+verlvtuMTU/GgydjrThcGMYthQCppXwRA2AbM:vK9oCBt1vtuMT8yBrLMYvfpXwRA2AbM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc47486253a14a2a9f7c8ee9851f6538_JaffaCakes118
Files
-
dc47486253a14a2a9f7c8ee9851f6538_JaffaCakes118.exe windows:4 windows x86 arch:x86
d2de2e12b48d24c591f39b518fdb1e55
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
LockFile
UnlockFile
SetEndOfFile
GetVolumeInformationA
GetFullPathNameA
GetFileAttributesA
SetErrorMode
RtlUnwind
ExitProcess
ExitThread
CreateThread
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetTimeZoneInformation
HeapReAlloc
TlsSetValue
SetStdHandle
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetHandleCount
GetStdHandle
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
FileTimeToLocalFileTime
InterlockedDecrement
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
SetLastError
MulDiv
GlobalAlloc
FormatMessageA
LocalFree
GlobalLock
GlobalUnlock
GlobalFree
InterlockedIncrement
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
lstrcpynA
CreateSemaphoreA
TerminateThread
ReleaseSemaphore
IsBadReadPtr
IsBadWritePtr
SystemTimeToFileTime
DuplicateHandle
GetFileType
GetFileInformationByHandle
FileTimeToSystemTime
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
GetTempFileNameA
MoveFileExA
FlushFileBuffers
SetFilePointer
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetSystemTime
TerminateProcess
GetCurrentProcess
GetProcessHeap
HeapAlloc
HeapFree
OpenProcess
FreeLibrary
ReadFile
FreeResource
lstrcatA
lstrlenA
WinExec
GetLocalTime
GetFileSize
lstrcpyA
LoadLibraryA
GetProcAddress
GetPrivateProfileIntA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetDiskFreeSpaceExA
GetSystemDirectoryA
CreateEventA
ResetEvent
GetModuleHandleA
CreateDirectoryA
WriteFile
FindFirstFileA
CreateFileA
GetFileTime
FindNextFileA
FindClose
GetTickCount
MultiByteToWideChar
WaitForSingleObject
SetEvent
ResumeThread
GetTempPathA
CreateMutexA
GetLastError
CloseHandle
GetModuleFileNameA
Sleep
SetFileAttributesA
DeleteFileA
CopyFileA
CreateProcessA
SetEnvironmentVariableA
GetCommandLineA
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetCurrentDirectoryA
GetShortPathNameA
FindResourceA
LoadResource
LockResource
HeapSize
SizeofResource
PeekNamedPipe
user32
RegisterWindowMessageA
WinHelpA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
MapWindowPoints
MessageBoxA
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
ScreenToClient
EqualRect
GetClassInfoA
RegisterClassA
GetDlgCtrlID
CallWindowProcA
SetWindowPos
IntersectRect
SystemParametersInfoA
SetCapture
CopyRect
GetWindow
FindWindowA
MsgWaitForMultipleObjects
DispatchMessageA
PeekMessageA
OffsetRect
GetNextDlgGroupItem
ClientToScreen
WindowFromPoint
DrawEdge
GetCapture
ReleaseCapture
GetCursorPos
GetParent
DrawFocusRect
FrameRect
FillRect
InflateRect
DrawStateA
UnregisterClassA
CharUpperA
LoadCursorA
SetCursor
IsWindowEnabled
BeginPaint
GetMessagePos
GetSysColor
EndPaint
InvalidateRgn
CopyAcceleratorTableA
IsRectEmpty
GetSysColorBrush
wsprintfA
DestroyMenu
GetWindowDC
GrayStringA
DrawTextExA
TabbedTextOutA
GetDlgItem
SetWindowTextA
PostMessageA
RegisterClassExA
CreateWindowExA
UpdateWindow
DestroyWindow
GetWindowLongA
DefWindowProcA
PostQuitMessage
GetSystemMetrics
LoadIconA
ReleaseDC
GetDC
GetClientRect
GetWindowRect
SetWindowRgn
PostThreadMessageA
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
LoadBitmapA
SetRect
PtInRect
InvalidateRect
SetWindowLongA
KillTimer
SetTimer
EnableWindow
RegisterClipboardFormatA
MessageBeep
TranslateMessage
SetWindowContextHelpId
MapDialogRect
GetMessageA
ValidateRect
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
CharNextA
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
ShowWindow
MoveWindow
IsDialogMessageA
GetWindowPlacement
DrawTextA
gdi32
SetMapMode
LineTo
MoveToEx
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreatePen
CreateSolidBrush
CreateRectRgnIndirect
GetMapMode
GetRgnBox
RestoreDC
SaveDC
GetTextColor
GetBkColor
GetDeviceCaps
GetStockObject
CreateBitmap
GetClipBox
SelectClipRgn
DeleteDC
StretchBlt
CreateCompatibleBitmap
DeleteObject
GetObjectA
CreateFontIndirectA
SelectObject
SetBkMode
SetTextColor
SetBkColor
CreateDIBitmap
GetPixel
BitBlt
CreateCompatibleDC
CombineRgn
CreateFontA
CreateRectRgn
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
shell32
SHFileOperationA
comctl32
ord17
_TrackMouseEvent
shlwapi
PathAddBackslashA
PathFindExtensionA
SHGetValueA
PathRemoveBackslashA
PathRemoveFileSpecA
PathFindFileNameA
PathFileExistsA
PathAppendA
PathRemoveBlanksA
UrlUnescapeA
PathStripToRootA
PathIsUNCA
oledlg
ord8
ole32
CoRevokeClassObject
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
OleCreateFontIndirect
SysStringLen
SysAllocStringByteLen
VariantCopy
SafeArrayDestroy
SystemTimeToVariantTime
SysAllocString
SysFreeString
ws2_32
WSACleanup
WSAStartup
wininet
InternetSetOptionA
InternetOpenA
InternetQueryOptionA
InternetSetStatusCallback
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
Sections
.text Size: 324KB - Virtual size: 321KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ