aclui.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dd503d2644f5212c1687e78112d84d2f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd503d2644f5212c1687e78112d84d2f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd503d2644f5212c1687e78112d84d2f_JaffaCakes118
-
Size
360KB
-
MD5
dd503d2644f5212c1687e78112d84d2f
-
SHA1
6d828c0ad0ee3ec0fb57e96234fa992b6b800960
-
SHA256
b534021f27b4f70241cb3c311e9aeec53883da5f3d6b536a9b4cd7e7dae20d5a
-
SHA512
bc7e204c5f8870594676d6faf8c938d8e8164f711c9deda8600502b64e892400b206283b5606e7745a6599a861e9b466297227d1d3d913b8cc85a74c79294752
-
SSDEEP
6144:EIwG2Zqj7dSaSmTou5zyQreqSdF3GPJqq8zmrmD551sXySF+al+o+pd6:72Zq/dSrmTp5zyfq0mqq8DOXyel+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd503d2644f5212c1687e78112d84d2f_JaffaCakes118
Files
-
dd503d2644f5212c1687e78112d84d2f_JaffaCakes118.exe windows:5 windows x86 arch:x86
d7d6a76b1b76190ea48bd9a0b879b42c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_controlfp
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
__setusermatherr
_wtoi
_wtol
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
wcschr
swscanf
wcstoul
_ftol
_purecall
advapi32
RegOpenKeyExW
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegEnumValueA
RegSetValueExA
RegEnumKeyA
RegCreateKeyExW
RegSetValueExW
RegOpenKeyW
RegQueryValueExW
RegCloseKey
RegCreateKeyW
kernel32
GetLastError
CreateMutexW
SetLastError
GetProcAddress
GetModuleHandleW
lstrcmpW
lstrcatW
CloseHandle
WriteFile
LoadLibraryA
MulDiv
Sleep
lstrcmpiW
WriteProfileStringW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoA
GetCommandLineW
lstrlenW
lstrcpyW
CreateFileW
GetFileSize
ReadFile
GetVersionExW
GetNumberFormatW
gdi32
TextOutW
RestoreDC
PatBlt
GetTextColor
RealizePalette
ExtTextOutW
BitBlt
CreateCompatibleBitmap
SetLayout
SelectObject
DeleteObject
SetBkColor
SelectPalette
SetTextColor
SetBkMode
CreatePalette
CreateBitmap
CreateCompatibleDC
GetTextMetricsW
DeleteDC
SetTextAlign
Rectangle
GetTextExtentPoint32W
SaveDC
CreateSolidBrush
SetPaletteEntries
GetStockObject
GetNearestColor
GetNearestPaletteIndex
GetPaletteEntries
GetDeviceCaps
CreateFontIndirectW
user32
SetTimer
KillTimer
SetCaretBlinkTime
SwapMouseButton
SetSysColors
SetFocus
GetFocus
GetForegroundWindow
DrawCaptionTempW
SetSysColorsTemp
LoadIconW
EnumDisplaySettingsW
ChangeDisplaySettingsW
SendMessageTimeoutW
FindWindowW
GetWindowRect
MapWindowPoints
SetWindowPos
ShowWindow
SetWindowLongW
LoadStringW
SendMessageW
GetDlgItem
SendDlgItemMessageW
SetDlgItemTextW
wsprintfW
GetWindowLongW
MessageBoxW
ReleaseDC
GetDC
GetDesktopWindow
SystemParametersInfoW
GetWindow
GetDlgCtrlID
GetTopWindow
GetClientRect
HiliteMenuItem
EnableMenuItem
LoadMenuW
OffsetRect
InflateRect
GetSystemMetrics
FillRect
DrawFrameControl
DestroyIcon
DrawTextW
DrawEdge
LoadImageW
InvalidateRect
DefWindowProcW
EndPaint
BeginPaint
GetSysColor
RegisterClassW
LoadCursorW
PostMessageW
GetParent
SetWindowTextW
EnableWindow
comctl32
PropertySheetW
comdlg32
GetSaveFileNameW
shell32
ShellExecuteW
ole32
CoInitialize
CoCreateInstance
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 51KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ