c:\Minoral_projects\Minoral\code\projets\contextuel_popper\exe\src\surf_accuracy\Release\Minoral.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f591d192b4186e9e7cecf5ab3f8798a6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f591d192b4186e9e7cecf5ab3f8798a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f591d192b4186e9e7cecf5ab3f8798a6_JaffaCakes118
-
Size
656KB
-
MD5
f591d192b4186e9e7cecf5ab3f8798a6
-
SHA1
9f450fa7fe8a65069f13575ba271aa4b67be321b
-
SHA256
e7728b53fb03a049f4131d35cfac3eae1034819d504724da33360d212089211a
-
SHA512
f50a713cb57e3109abdb28a10679ee49989558786e10e505fe6190333e864fe910a1ebc072414f658855a3056bebc55bb9a912d364f75eae8bc723fd5529fdba
-
SSDEEP
12288:o11ch8pS3OK8oQdgTJVGWyRldWUVH0disZX79jTXZ1Q2b:oEhtV85S+WyRiUVUdVXTXZ+2b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f591d192b4186e9e7cecf5ab3f8798a6_JaffaCakes118
Files
-
f591d192b4186e9e7cecf5ab3f8798a6_JaffaCakes118.exe windows:4 windows x86 arch:x86
ce5d73aaf11c44fb779bf73a8c77605b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shlwapi
SHGetValueA
PathFileExistsA
PathRemoveExtensionA
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
SHSetValueA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
SetSecurityDescriptorDacl
RegOpenKeyA
RegDeleteKeyA
wininet
InternetCrackUrlA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
kernel32
DeleteFileA
GetThreadLocale
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
FindClose
FindFirstFileA
GetFullPathNameA
GlobalGetAtomNameA
CreateSemaphoreA
ReleaseSemaphore
InterlockedIncrement
InterlockedDecrement
lstrcmpW
GlobalFindAtomA
GetModuleFileNameW
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsGetValue
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalAddAtomA
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
SetErrorMode
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
GetTickCount
RtlUnwind
GetSystemTimeAsFileTime
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetStartupInfoA
ExitThread
CreateThread
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
GetTimeZoneInformation
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetDriveTypeA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
RaiseException
LocalAlloc
GetProcessHeap
HeapFree
SetFilePointer
WriteFile
ReadFile
FreeResource
GetCurrentProcess
LocalFree
CreateMutexA
GetCurrentThreadId
CreateToolhelp32Snapshot
Process32First
OpenProcess
GetExitCodeProcess
TerminateProcess
Process32Next
SetLastError
Sleep
GetVolumeInformationA
CopyFileA
GetTempFileNameA
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetModuleFileNameA
GetCommandLineA
DeleteCriticalSection
GetVersionExA
GetCurrentProcessId
FreeLibrary
LoadLibraryW
lstrlenA
lstrcmpiA
CompareStringA
CompareStringW
MultiByteToWideChar
InterlockedExchange
GetVersion
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
DosDateTimeToFileTime
LocalFileTimeToFileTime
CompareFileTime
SystemTimeToFileTime
CloseHandle
CreateFileA
SetFileTime
GetTempPathA
LoadLibraryA
GetProcAddress
GetLastError
WaitForSingleObject
CreateDirectoryA
user32
GrayStringA
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
SetCapture
ReleaseCapture
CharNextA
CopyAcceleratorTableA
IsRectEmpty
SetRect
InvalidateRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
DestroyMenu
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
DrawTextExA
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetNextDlgTabItem
EndDialog
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DrawTextA
TabbedTextOutA
SetWindowsHookExA
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
wsprintfA
GetParent
GetClassNameA
GetSystemMetrics
WaitForInputIdle
EnumThreadWindows
EnumChildWindows
SendMessageTimeoutA
GetForegroundWindow
GetClientRect
SetWindowTextA
GetWindowThreadProcessId
BringWindowToTop
EnableWindow
SetParent
SetTimer
PostMessageA
KillTimer
RegisterWindowMessageA
EnumWindows
GetWindowTextA
GetCursorPos
CharUpperA
ShowWindow
MoveWindow
IsDialogMessageA
CopyRect
GetDlgItem
gdi32
SetTextColor
GetClipBox
CreateBitmap
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
Escape
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
GetDeviceCaps
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SelectObject
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
oledlg
ord8
ole32
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
OleFlushClipboard
CoDisconnectObject
CoTaskMemFree
OleRun
CoInitialize
CoCreateInstance
CoGetMalloc
CoUninitialize
CoInitializeEx
CoRegisterMessageFilter
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
OleInitialize
CoFreeUnusedLibraries
CoRevokeClassObject
OleIsCurrentClipboard
oleaut32
LoadTypeLi
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
SysAllocStringByteLen
SysStringLen
VariantChangeType
GetErrorInfo
VariantInit
VariantCopy
SysAllocStringLen
SysFreeString
VariantClear
SysAllocString
ws2_32
WSAStartup
Sections
.text Size: 512KB - Virtual size: 508KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ