e:\VC\project_baroband\uninstaller\Release\uninstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fe659fa774baa80253a8a42f2a2f9977_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe659fa774baa80253a8a42f2a2f9977_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe659fa774baa80253a8a42f2a2f9977_JaffaCakes118
-
Size
300KB
-
MD5
fe659fa774baa80253a8a42f2a2f9977
-
SHA1
76f3db528d2a1209bac07eb914af08380e761071
-
SHA256
5b55f1f0aa59fd68245d4211261d229222b8f1a1e6056b9c36c4a7c714072eca
-
SHA512
ad432f3ba1c7a77bd55184b50af52e980311cc1b95407e447899a549af856f1d4381326dec1cc5e5fec9e918fdec6ffc30dff3ac137e101b3952b67cb8ea71b4
-
SSDEEP
6144:L7lPyjbtS9xWkuvHwWAh7x3iXcwPMRhIkQ:lPyjbtA8vHwWAKfER6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe659fa774baa80253a8a42f2a2f9977_JaffaCakes118
Files
-
fe659fa774baa80253a8a42f2a2f9977_JaffaCakes118.exe windows:4 windows x86 arch:x86
bc0419af70a2d9490e874df3fcb48311
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
RtlUnwind
SetEnvironmentVariableA
SetCurrentDirectoryA
GetDriveTypeA
GetFileType
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
RaiseException
HeapSize
SetStdHandle
QueryPerformanceCounter
GetCurrentProcessId
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetUnhandledExceptionFilter
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
VirtualProtect
VirtualQuery
SetErrorMode
GetFileTime
GetOEMCP
GetCPInfo
GlobalFlags
GetCurrentDirectoryA
WritePrivateProfileStringA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
InterlockedIncrement
CreateFileA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
InterlockedDecrement
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
FreeResource
WaitForSingleObject
GlobalAddAtomA
GetCurrentThreadId
GlobalDeleteAtom
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
HeapReAlloc
GetCurrentThread
GetCurrentProcess
SetLastError
OpenProcess
GetExitCodeProcess
TerminateProcess
CloseHandle
GetProcessHeap
HeapAlloc
HeapFree
CreateDirectoryA
DeleteFileA
GetModuleFileNameA
GetTempPathA
GetModuleHandleA
GetSystemInfo
WinExec
CreateProcessA
GetTickCount
LoadLibraryExA
GetFileAttributesA
LoadLibraryA
GetProcAddress
FreeLibrary
GetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
lstrlenA
lstrcmpiA
CompareStringW
lstrlenW
CompareStringA
GetVersion
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
LCMapStringW
InterlockedExchange
user32
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
MapDialogRect
SetWindowPos
GetDesktopWindow
SetActiveWindow
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
MessageBoxA
GetParent
GetWindowLongA
CharUpperA
IsDialogMessageA
SetWindowTextA
MessageBeep
GetNextDlgGroupItem
GetLastActivePopup
IsWindowEnabled
SetCursor
PostQuitMessage
wsprintfA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
EnumWindows
GetClassNameA
PostMessageA
FindWindowA
GetSystemMetrics
PeekMessageA
TranslateMessage
PostThreadMessageA
DispatchMessageA
GetMessageA
LoadIconA
EnableWindow
SetTimer
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
RegisterClipboardFormatA
CreateDialogIndirectParamA
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
ReleaseCapture
MoveWindow
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
SetWindowContextHelpId
ShowWindow
SetCapture
gdi32
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegEnumKeyA
RegOverridePredefKey
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegQueryValueExA
AdjustTokenPrivileges
RegQueryValueA
RegCloseKey
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
shell32
SHFileOperationA
ShellExecuteExA
SHGetSpecialFolderPathA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
SHQueryValueExA
PathIsUNCA
oledlg
ord8
ole32
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
CoRevokeClassObject
CoRegisterMessageFilter
OleFlushClipboard
CoTaskMemFree
CoCreateGuid
StringFromGUID2
OleInitialize
OleUninitialize
OleIsCurrentClipboard
oleaut32
SysFreeString
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
SysAllocString
SysAllocStringLen
wininet
InternetWriteFile
InternetSetFilePointer
InternetGetLastResponseInfoA
InternetQueryDataAvailable
InternetGetCookieA
InternetSetOptionExA
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetSetStatusCallback
InternetConnectA
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
rpcrt4
UuidCreateSequential
ws2_32
inet_ntoa
gethostbyname
gethostname
WSAStartup
WSACleanup
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ