m:\BIEW\PJ_SP-BIEW0807\Packages\Installation\Outils\setupApiWrapper\src\Release\setupApiWrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eb56b1a16e19e7071a10b07b3d27120a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb56b1a16e19e7071a10b07b3d27120a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb56b1a16e19e7071a10b07b3d27120a_JaffaCakes118
-
Size
228KB
-
MD5
eb56b1a16e19e7071a10b07b3d27120a
-
SHA1
86885fd711997c71da63f85536a6858167a08254
-
SHA256
fbd588d69e810ac0ab2a60c5cb2dde07718da0a4e67a119ffd6f370a2c2423cf
-
SHA512
40267173b675acb14a2ab3eb9bd618249ab804acdfeadcfa38dcb0c15ba11877ca6ef991f1ef91ca7167847a76268735998a707c4ab478f8b26ae82fb755eb4d
-
SSDEEP
3072:nY5Y1z8+4yqIerIWZ/Zb15QjqjkPZ+hY+o5NkUnDs28O7l3IMEPgXDKtbrObue:pzhqIeUWZhQOQB+hfsfDlIMEPTNSbx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb56b1a16e19e7071a10b07b3d27120a_JaffaCakes118
Files
-
eb56b1a16e19e7071a10b07b3d27120a_JaffaCakes118.exe windows:4 windows x86 arch:x86
8fd07ec5438ba08e2f06f042998b2928
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
setupapi
SetupDiCreateDeviceInfoList
SetupDiDeleteDeviceInfo
SetupDiSetDeviceRegistryPropertyA
SetupDiEnumDriverInfoA
SetupDiGetDriverInfoDetailA
SetupDiGetDeviceInstanceIdA
SetupDiOpenDevRegKey
SetupDiGetDeviceInstallParamsA
SetupDiRemoveDevice
SetupCopyOEMInfA
SetupDiSetClassInstallParamsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
CMP_WaitNoPendingInstallEvents
SetupDiClassGuidsFromNameA
SetupDiGetClassDevsA
SetupDiCreateDeviceInfoA
SetupDiRegisterDeviceInfo
SetupDiSetDeviceInstallParamsA
SetupDiBuildDriverInfoList
SetupDiEnumDriverInfoW
SetupDiSetSelectedDriverW
SetupDiSelectDevice
SetupDiGetSelectedDriverW
SetupDiCallClassInstaller
SetupDiCreateDevRegKeyA
SetupDiInstallDriverFiles
SetupDiDestroyDeviceInfoList
kernel32
GetCurrentProcess
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
TerminateProcess
HeapSize
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GlobalFlags
lstrcatA
WritePrivateProfileStringA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CloseHandle
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
SetLastError
GlobalLock
GlobalUnlock
lstrcpynA
ReadFile
GetStdHandle
WriteFile
lstrcmpiA
GetVersion
MultiByteToWideChar
LocalAlloc
lstrlenA
GlobalAlloc
GlobalFree
GetLastError
FormatMessageA
LocalFree
ExitProcess
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
DestroyMenu
RegisterWindowMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
CopyRect
ShowWindow
SetWindowLongA
GetDlgItem
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindow
GetDlgCtrlID
SetWindowPos
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostMessageA
GetWindowRect
PtInRect
SetWindowTextA
GetClassNameA
wsprintfA
GetCapture
ClientToScreen
GetWindowTextA
UnhookWindowsHookEx
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
SetMenuItemBitmaps
GetFocus
ModifyMenuA
IsIconic
PostQuitMessage
SetCursor
SendMessageA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
MessageBoxA
ValidateRect
GetCursorPos
PeekMessageA
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageA
TranslateMessage
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
gdi32
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetDeviceCaps
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegFlushKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegCloseKey
comctl32
ord17
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantInit
VariantClear
VariantChangeType
Sections
.text Size: 124KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rrdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE