C:\DistributedAutoLink\Temp\regguide.exe_N11272Release\setup\regguide_ol\CompileOutputDir\regguide.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dcfb2ea48360bbdcac1e6a7ac63f9e89_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dcfb2ea48360bbdcac1e6a7ac63f9e89_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcfb2ea48360bbdcac1e6a7ac63f9e89_JaffaCakes118
-
Size
110KB
-
MD5
dcfb2ea48360bbdcac1e6a7ac63f9e89
-
SHA1
4f413e30a2facf478799724b5c0d910915ea484d
-
SHA256
17f28f7291e137860851ae9cf109b917581b4ea7a7319a24ab5400a44f1190d0
-
SHA512
7acc3d1a70f41d4320d3f19ac7a2ae36639d47103833cd444c8c7f5de8bbb2d9408b625fe48e3da72731196dbae71123293acc1ca66c6377d298a06397365971
-
SSDEEP
3072:gA3yDwfsyueHXssepnbW03kwS0p7rruqcCXPlT815yuH:gA3ujW01725K8iC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcfb2ea48360bbdcac1e6a7ac63f9e89_JaffaCakes118
Files
-
dcfb2ea48360bbdcac1e6a7ac63f9e89_JaffaCakes118.exe windows:4 windows x86 arch:x86
e51a5b5aac21ccd895393f445e984f79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc71
ord3345
ord4967
ord1362
ord1964
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4265
ord635
ord553
ord395
ord742
ord4486
ord5165
ord762
ord1903
ord4168
ord1395
ord6065
ord5859
ord4115
ord4299
ord2250
ord2253
ord2252
ord5315
ord1320
ord1312
ord2146
ord5832
ord5831
ord2163
ord3988
ord6089
ord6064
ord4124
ord5802
ord2653
ord3759
ord6066
ord4117
ord4114
ord2718
ord3399
ord5571
ord5944
ord3114
ord3906
ord5947
ord3909
ord2058
ord1950
ord2849
ord2942
ord4481
ord4261
ord3169
ord454
ord686
ord4469
ord4467
ord3683
ord2248
ord297
ord1489
ord6118
ord299
ord2933
ord757
ord298
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord3333
ord566
ord6067
ord593
ord5225
ord5119
ord334
ord959
ord547
ord1054
ord4081
ord3645
ord3450
ord4566
ord2614
ord2621
ord6238
ord6277
ord2051
ord5156
ord5592
ord1379
ord5412
ord2742
ord5495
ord4257
ord4852
ord4739
ord1922
ord4222
ord3040
ord2768
ord5934
ord6043
ord4482
ord4264
ord368
ord616
ord1123
ord4035
ord4705
ord3633
ord3602
ord3650
ord3477
ord3997
ord5563
ord2815
ord4132
ord2008
ord1302
ord4131
ord4674
ord4961
ord4507
ord4946
ord4649
ord4964
ord5053
ord4805
ord4710
ord4796
ord4963
ord4377
ord4376
ord4287
ord4794
ord4948
ord4673
ord4516
ord4480
ord4970
ord4846
ord4501
ord4368
ord4439
ord5049
ord4559
ord4920
ord4520
ord4914
ord3740
ord4444
ord4443
ord4790
ord4204
ord4781
ord4980
ord4171
ord4178
ord4776
ord4386
ord4401
ord4399
ord4381
ord4384
ord4379
ord4863
ord4860
ord3974
ord5914
ord3946
ord5151
ord5206
ord4282
ord3344
ord1360
ord2717
ord4273
ord648
ord2141
ord410
ord5166
ord2803
ord4200
ord1084
ord1091
ord2372
ord2419
ord2420
ord2418
ord2417
ord266
ord4129
ord4587
ord2566
ord4364
ord1191
ord1187
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord1612
ord1613
ord4971
ord4529
ord2421
ord1614
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4277
ord4722
ord3403
ord1306
ord2173
ord5205
ord4185
ord6275
ord5073
ord1908
ord5148
ord4244
ord1402
ord3945
ord1617
ord1620
ord5915
ord1557
ord4019
ord2424
ord2425
ord2992
ord5356
ord943
ord4904
ord2939
ord4135
ord4309
ord5012
ord5009
ord2615
ord1913
ord2246
ord3466
ord3648
ord2131
ord3934
ord911
ord5529
ord4108
ord265
ord764
ord304
ord2272
ord4109
ord6174
ord2902
ord2451
ord784
ord1486
ord781
ord2322
ord876
ord2468
ord5403
ord578
ord2016
ord310
ord1207
msvcr71
?terminate@@YAXXZ
__security_error_handler
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
memset
wcscpy
_except_handler3
_resetstkoflw
free
malloc
memmove
time
srand
rand
_mbscmp
_i64toa
atol
atoi
_strupr
_vsnprintf
strchr
strncpy
sscanf
strrchr
_mbsupr
_mbsstr
_mbsrchr
_mbschr
__CxxFrameHandler
_setmbcp
realloc
_strnicmp
_stricmp
_CxxThrowException
_controlfp
wcslen
sprintf
_purecall
_mbsnbcat
_mbsnbcpy
kernel32
CreateFileA
SetFilePointer
WriteFile
FlushFileBuffers
SetEndOfFile
SystemTimeToFileTime
SetFileTime
CloseHandle
lstrcmpiA
SetFileAttributesA
MoveFileA
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetLastError
lstrcpynA
CreateDirectoryA
GetLastError
lstrlenA
lstrcpyA
WritePrivateProfileStringA
GetProcAddress
LoadLibraryA
FreeLibrary
ReleaseMutex
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetLocalTime
WinExec
DeleteFileA
GetCurrentThreadId
GetCurrentProcessId
OutputDebugStringA
GetTickCount
CreateMutexA
GetVersion
GetCommandLineA
CopyFileA
FindNextFileA
MultiByteToWideChar
WideCharToMultiByte
LocalFree
FormatMessageA
LoadLibraryExA
lstrlenW
InterlockedDecrement
IsBadReadPtr
lstrcmpiW
CompareStringA
CompareStringW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetStringTypeExA
GetStringTypeExW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleA
GetStartupInfoA
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
FileTimeToSystemTime
FindClose
GetFileSize
lstrcatA
EnterCriticalSection
LeaveCriticalSection
FindFirstFileA
user32
wvsprintfA
PostMessageA
SetForegroundWindow
ShowWindow
UnregisterClassA
CharUpperW
CharLowerW
CharUpperA
CharLowerA
EnableWindow
GetParent
IsWindow
wsprintfA
SendMessageA
SetMenu
GetWindowRect
GetClientRect
FindWindowA
UpdateWindow
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
shlwapi
PathFileExistsA
PathSkipRootA
PathRemoveFileSpecA
oleaut32
GetErrorInfo
VariantClear
VariantChangeType
SetErrorInfo
CreateErrorInfo
VariantInit
SysFreeString
SysAllocString
wininet
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetSetOptionA
InternetOpenA
InternetConnectA
InternetCloseHandle
InternetCrackUrlA
InternetAttemptConnect
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.+% Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE