d:\module\edition2\release\wyx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0682061c93f02f0d4ba203940649c18d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0682061c93f02f0d4ba203940649c18d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0682061c93f02f0d4ba203940649c18d_JaffaCakes118
-
Size
620KB
-
MD5
0682061c93f02f0d4ba203940649c18d
-
SHA1
2ef7529c2a5a2b6d26f759b3543e394217991dfd
-
SHA256
a483398b8b948be6d4a178fdfe6d4f703d1c210711a79eccefd4db9f228d9ef9
-
SHA512
7db748d879cd5e4191619ed162ec1b91eced0bacd53ba946bed335ad81328dd6e1090d57f25e1a97fe8ed5edc58504f160808e5a00623edda069c4b30af869cc
-
SSDEEP
12288:A95Q6e3pa8Q4JLVEVTz+aJDfnrbyaTQQQQ+5Bru21WtKfGeCOC:KQW4JLuVTVaaOBt1qteQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0682061c93f02f0d4ba203940649c18d_JaffaCakes118
Files
-
0682061c93f02f0d4ba203940649c18d_JaffaCakes118.exe windows:4 windows x86 arch:x86
27a095373ad9df58a4caa249a685d4cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TlsFree
SetErrorMode
GetFileAttributesW
GetFileTime
GetTickCount
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
RaiseException
HeapReAlloc
SetStdHandle
GetFileType
ExitThread
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
LocalReAlloc
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
GetCurrentDirectoryA
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrlenA
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateEventW
SetEvent
SetThreadPriority
InterlockedIncrement
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
InterlockedDecrement
GetModuleHandleA
CreateFileW
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
FreeLibrary
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GetLastError
SetLastError
GetProcAddress
LoadLibraryW
GlobalFree
FormatMessageW
LocalFree
MulDiv
WideCharToMultiByte
GetPrivateProfileSectionW
OpenProcess
GetCurrentProcessId
Sleep
ResumeThread
SuspendThread
GetModuleHandleW
CloseHandle
WritePrivateProfileStringW
CopyFileW
CreateDirectoryW
GetSystemDirectoryW
GetPrivateProfileIntW
GetVersionExW
GlobalMemoryStatus
MultiByteToWideChar
GetModuleFileNameW
FreeResource
GlobalUnlock
GlobalLock
GlobalAlloc
DeleteFileW
GetPrivateProfileStringW
GetTempFileNameW
GetTempPathW
CreateProcessW
LockResource
SizeofResource
LoadResource
FindResourceW
lstrlenW
WaitForSingleObject
GetCommandLineW
CreateThread
user32
ReleaseCapture
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatW
PostThreadMessageW
GetMessageW
TranslateMessage
ValidateRect
CharNextW
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
GetWindowThreadProcessId
CharUpperW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
SetCapture
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetKeyState
IsWindowVisible
GetMenu
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetWindowLongW
GetDlgItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableW
UnregisterClassW
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
SetFocus
DestroyMenu
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
UpdateWindow
SetCursor
IsWindow
GetCursorPos
GetSubMenu
LoadMenuW
SetForegroundWindow
SetWindowRgn
OffsetRect
GetWindowRect
GetSystemMetrics
SystemParametersInfoW
LoadIconW
LoadCursorW
InvalidateRect
KillTimer
GetParent
SetTimer
PtInRect
GetClientRect
EnableWindow
PostMessageW
SendMessageW
wsprintfW
UnregisterClassA
gdi32
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetViewportExtEx
ScaleViewportExtEx
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
DeleteObject
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
CreateCompatibleDC
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
CreateRectRgnIndirect
GetDeviceCaps
CreateRoundRectRgn
BitBlt
CreateDIBSection
GetWindowExtEx
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
shell32
ShellExecuteW
Shell_NotifyIconW
SHGetFolderPathW
shlwapi
PathIsUNCW
UrlUnescapeW
PathFindExtensionW
PathStripToRootW
PathFindFileNameW
oledlg
OleUIBusyW
ole32
OleFlushClipboard
CoCreateInstance
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CoInitializeSecurity
CoTaskMemFree
CoTaskMemAlloc
OleIsCurrentClipboard
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
oleaut32
OleCreateFontIndirect
VariantChangeType
SafeArrayDestroy
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocStringLen
SysStringLen
SysAllocString
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
VariantClear
VariantCopy
VariantInit
gdiplus
GdipCloneImage
GdipDisposeImage
GdipFree
GdipAlloc
GdipDrawImageRectRectI
GdipGetImageWidth
GdipGetImageHeight
GdipLoadImageFromStream
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipMeasureString
GdipDrawImageRect
GdiplusStartup
GdiplusShutdown
GdipCreateFromHDC
GdipDrawImage
GdipDrawString
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDrawImageRectI
GdipCreateStringFormat
GdipDeleteGraphics
wininet
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetQueryOptionW
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetGetLastResponseInfoW
InternetCloseHandle
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
InternetQueryDataAvailable
InternetOpenW
InternetGetConnectedState
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
winmm
timeGetTime
ws2_32
gethostbyname
WSACleanup
WSAStartup
Sections
.text Size: 304KB - Virtual size: 303KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 224KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ