g:\diskd\visual\Protector\release\EC2Instalator.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eac31c34f340755bde406716c7ea2e5f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac31c34f340755bde406716c7ea2e5f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac31c34f340755bde406716c7ea2e5f_JaffaCakes118
-
Size
4.1MB
-
MD5
eac31c34f340755bde406716c7ea2e5f
-
SHA1
8c2e4b3c7cc4a30c8ea9896c3a8257f5d5a347ae
-
SHA256
e4a3093a3c676a05915df5799a0ff8318942206f492cc3822c0eff8f75692917
-
SHA512
820cd4f366518148840cfbc5796b535c40af6be57586a24b6e3dcc73537eec9facc97ebf61440de99e4888945a83b6388270b30cf31d5d1da009d987c9288b20
-
SSDEEP
98304:fJLVVI9oWivZYoRsIeYoRsIz/5KazfpKREC81hwH3v:fJLcXuTuUCfpuE5u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eac31c34f340755bde406716c7ea2e5f_JaffaCakes118
Files
-
eac31c34f340755bde406716c7ea2e5f_JaffaCakes118.exe windows:5 windows x86 arch:x86
21bf6b03679a26c3108e73b2a994a641
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetErrorMode
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetCPInfo
GetOEMCP
FindResourceExA
GetTickCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
RtlUnwind
ExitThread
CreateThread
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GlobalFlags
InitializeCriticalSectionAndSpinCount
HeapCreate
VirtualFree
SetHandleCount
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetDriveTypeA
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetModuleHandleW
InterlockedIncrement
FileTimeToLocalFileTime
FormatMessageA
LocalFree
MulDiv
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetCurrentProcessId
GlobalAddAtomA
GlobalUnlock
WritePrivateProfileStringA
FreeResource
GlobalFree
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GetShortPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetLastError
lstrlenA
GetThreadLocale
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
GetCurrentThreadId
ResumeThread
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
FileTimeToSystemTime
SetFileTime
WriteFile
DosDateTimeToFileTime
GetCurrentDirectoryA
ReadFile
SetFilePointer
GetFileType
CreateFileA
DuplicateHandle
GetLastError
FindClose
FindNextFileA
MultiByteToWideChar
GetFullPathNameA
CreateDirectoryA
DeleteFileA
SetFileAttributesA
ExpandEnvironmentStringsA
FindFirstFileA
GetCurrentProcess
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GlobalAlloc
GetModuleHandleA
GetModuleFileNameA
CopyFileA
Sleep
WinExec
RemoveDirectoryA
TerminateProcess
CloseHandle
OpenProcess
FreeLibrary
GetProcAddress
LoadLibraryA
GetStdHandle
GetVersionExA
user32
RegisterClipboardFormatA
PostThreadMessageA
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
LockWindowUpdate
EnumChildWindows
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
PtInRect
DefWindowProcA
CallWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowThreadProcessId
GetLastActivePopup
SetCursor
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
PostMessageA
GetWindowTextLengthA
MessageBoxA
SendMessageA
EnableWindow
GetWindowTextA
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
IsWindow
SetWindowTextA
GetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
UnregisterClassA
DestroyIcon
GetDialogBaseUnits
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
GetMenuItemCount
IsRectEmpty
LoadIconA
GetSystemMenu
AppendMenuA
GetWindowRect
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SetTimer
KillTimer
ExitWindowsEx
PostQuitMessage
GetSysColor
InvalidateRect
ValidateRect
GetCursorPos
PeekMessageA
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
CallNextHookEx
SetWindowsHookExA
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
GetParent
GetFocus
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
CharUpperA
GetWindow
GetDlgItem
gdi32
ExtSelectClipRgn
DeleteDC
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetTextMetricsA
EnumFontFamiliesExA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetStockObject
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
GetTextExtentPoint32A
ExtTextOutA
SetBkColor
SetTextColor
GetClipBox
CreateRectRgnIndirect
CreateBitmap
CreateFontIndirectA
GetObjectA
CreateSolidBrush
GetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegEnumKeyA
RegCreateKeyA
RegSetValueA
RegQueryValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteValueA
shell32
ord680
ShellExecuteA
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
ExtractIconA
comctl32
InitCommonControlsEx
shlwapi
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
oledlg
ord8
ole32
OleIsCurrentClipboard
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
StringFromGUID2
CoRevokeClassObject
CoRegisterClassObject
OleFlushClipboard
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
CoInitialize
CoRegisterMessageFilter
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
SysStringByteLen
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
Sections
.text Size: 326KB - Virtual size: 325KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 281KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ