s:\Projects\work\Security Tools 3.0 source code\Security Tools 3.0\AdwareRemover\Release\AdwareRemover.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eabf13ea1ea7d78a0f69d51bcc19cf91_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eabf13ea1ea7d78a0f69d51bcc19cf91_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eabf13ea1ea7d78a0f69d51bcc19cf91_JaffaCakes118
-
Size
1.8MB
-
MD5
eabf13ea1ea7d78a0f69d51bcc19cf91
-
SHA1
6e8708c256615f3b02be2e6cf2903f92434d75a8
-
SHA256
1f2cab3efe906e9c7b0204c1cc4447376d0c5641c38f94f92540b055da0e5a1c
-
SHA512
350237f428ea57c066422b33d110be38bc1fac3c626b3a50122c8a33cf687f695482bd13ed9d853136f2188978da6db0d88548e049011d38a3ee9500ff7f3d3b
-
SSDEEP
12288:kHWZBEX30oVaZZY+VOF8uu238ljH3pSz:IWZyHhanBVOFA2Mt52
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eabf13ea1ea7d78a0f69d51bcc19cf91_JaffaCakes118
Files
-
eabf13ea1ea7d78a0f69d51bcc19cf91_JaffaCakes118.exe windows:4 windows x86 arch:x86
62aa3561ba5799565f9dd0e9f41e7ff3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
PlaySoundA
shell32
SHGetFileInfoA
Shell_NotifyIconA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHFileOperationA
DragQueryFileA
DragFinish
SHGetSpecialFolderLocation
ws2_32
WSCEnumProtocols
WSAStartup
WSAEnumNameSpaceProvidersA
WSCUnInstallNameSpace
WSCDeinstallProvider
WSACleanup
wininet
InternetReadFile
InternetQueryDataAvailable
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
kernel32
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
InterlockedIncrement
FileTimeToSystemTime
SystemTimeToFileTime
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SetErrorMode
HeapAlloc
FlushFileBuffers
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetCurrentProcessId
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetDiskFreeSpaceA
GetFullPathNameA
GetFileTime
SetFileTime
InterlockedDecrement
WritePrivateProfileStringA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
FormatMessageA
LocalFree
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
MulDiv
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
DeleteFileA
MoveFileA
SetFileAttributesA
GetShortPathNameA
WriteFile
GetLocalTime
GetCurrentThreadId
Module32First
Module32Next
GetFileSize
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateProcessA
Sleep
FindFirstFileA
FindNextFileA
FindClose
CreateToolhelp32Snapshot
Process32First
Process32Next
LeaveCriticalSection
EnterCriticalSection
SetFilePointer
ReadFile
CreateFileA
LoadLibraryA
GetProcAddress
FreeLibrary
TerminateThread
CreateThread
OpenProcess
GetCurrentThread
GetCurrentProcess
CloseHandle
SetLastError
TerminateProcess
WaitForSingleObject
GetFileAttributesA
GetTempPathA
GetTempFileNameA
lstrcpynA
GetModuleHandleA
GetLogicalDrives
GetDriveTypeA
GetVolumeInformationA
GetTickCount
lstrcmpA
FindResourceExA
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
SizeofResource
GetStringTypeExA
GetEnvironmentVariableA
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
HeapFree
GetProcessHeap
user32
LoadAcceleratorsA
ReuseDDElParam
UnpackDDElParam
SetCursorPos
DestroyCursor
SetRect
CopyAcceleratorTableA
InvalidateRgn
GetSysColorBrush
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
TabbedTextOutA
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
wsprintfA
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
ShowOwnedPopups
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
WinHelpA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
MessageBoxA
InsertMenuItemA
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
GetMenuItemCount
EqualRect
DeferWindowPos
SetScrollInfo
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
IntersectRect
GetWindowPlacement
CopyRect
GetWindow
SetFocus
GetDlgCtrlID
GetFocus
IsChild
PtInRect
SetCapture
IsRectEmpty
SystemParametersInfoA
AdjustWindowRectEx
wvsprintfA
CharNextA
ExitWindowsEx
OffsetRect
DrawFocusRect
ClientToScreen
WindowFromPoint
GetNextDlgGroupItem
GetWindowLongA
GetDC
SetWindowRgn
DrawEdge
GetCapture
ReleaseCapture
SetCursor
GetParent
RedrawWindow
LoadStringA
DestroyIcon
LoadMenuA
SetForegroundWindow
TrackPopupMenuEx
PostMessageA
DestroyMenu
GetSysColor
FillRect
LoadBitmapA
GetCursorPos
ScreenToClient
PostQuitMessage
LoadCursorA
GetSystemMetrics
IsWindow
LoadIconA
GetDesktopWindow
KillTimer
SetTimer
IsWindowVisible
InvalidateRect
GetMenuItemInfoA
InflateRect
UpdateWindow
GetClientRect
GetWindowRect
IsIconic
GetMenu
GetSubMenu
GetMenuItemID
EnableMenuItem
CheckMenuItem
DrawIcon
RegisterWindowMessageA
FindWindowA
SendMessageA
UnregisterClassA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TrackPopupMenu
TranslateAcceleratorA
EnableWindow
CharUpperA
CharLowerA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GrayStringA
DrawTextExA
GetKeyState
DrawTextA
GetScrollInfo
gdi32
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreatePatternBrush
CreateSolidBrush
GetTextExtentPoint32A
CreateRectRgnIndirect
PatBlt
SetViewportExtEx
GetRgnBox
GetBkColor
GetTextColor
SetMapMode
SetBkMode
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
Ellipse
LPtoDP
CreateEllipticRgn
SelectClipRgn
CreateRectRgn
CombineRgn
DeleteDC
DeleteObject
GetPixel
SelectObject
CreateCompatibleBitmap
CreateFontIndirectA
StretchBlt
BitBlt
CreateCompatibleDC
GetObjectA
GetMapMode
GetStockObject
RestoreDC
SaveDC
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegEnumValueA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
OpenThreadToken
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
GetFileSecurityA
SetFileSecurityA
RegCloseKey
RegEnumKeyA
RegOpenKeyA
comctl32
ord17
ImageList_ReplaceIcon
_TrackMouseEvent
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ImageList_Draw
ImageList_GetImageInfo
shlwapi
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathIsUNCA
ole32
CreateILockBytesOnHGlobal
CoInitialize
OleIsCurrentClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoTaskMemAlloc
OleFlushClipboard
StgCreateDocfileOnILockBytes
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoUninitialize
CoTaskMemFree
oleaut32
VariantCopy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocString
SafeArrayDestroy
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocStringByteLen
SysStringLen
VariantChangeType
VariantClear
VariantInit
SysFreeString
SysAllocStringLen
oledlg
ord8
Sections
.text Size: 332KB - Virtual size: 331KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ