c:\Documents and Settings\Ran\My Documents\Visual Studio 2005\Projects\PhishingAgentProject\release\BHOInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fdfac250d1daea7795080bfce87f19e8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdfac250d1daea7795080bfce87f19e8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fdfac250d1daea7795080bfce87f19e8_JaffaCakes118
-
Size
148KB
-
MD5
fdfac250d1daea7795080bfce87f19e8
-
SHA1
3ecd79778297f7b7dd9882a23dbe94d6fe5828be
-
SHA256
0fda168dcfae25746135c8f5d289608a877f1daff2bd4380a9f72a0d7dc0732b
-
SHA512
1c7cc08af3824ddd4bc1c3c2c720f532360caee16782a97a4b978d7197ae7a674618225b78564f6000ad504ae81e2e589fffa937c2ae2e02b18aef5b83cfca96
-
SSDEEP
3072:PNBWUniKqydlMkGfV8UZcdDVqAzC48MUtef:lHitydSkGfOCeY4DTf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fdfac250d1daea7795080bfce87f19e8_JaffaCakes118
Files
-
fdfac250d1daea7795080bfce87f19e8_JaffaCakes118.exe windows:4 windows x86 arch:x86
8eb7ce4c1d99485b5feb4282d77ef346
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathFileExistsW
wininet
InternetOpenUrlW
InternetCloseHandle
InternetReadFileExW
InternetOpenW
kernel32
GetFileAttributesW
CopyFileW
CreateDirectoryW
GetProcAddress
CloseHandle
DeleteFileW
GetVersionExW
CreateFileW
LoadLibraryW
GetWindowsDirectoryW
GetLocaleInfoW
CreateFileA
SetEndOfFile
GetCPInfo
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
LCMapStringA
LCMapStringW
RtlUnwind
RaiseException
GetModuleHandleA
ExitProcess
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
ReadFile
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
advapi32
RegOpenKeyExW
RegDeleteKeyW
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegSetValueExW
RegCloseKey
RegCreateKeyExW
shell32
ShellExecuteW
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ