e:\binIE\MiniIE2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
08403f2e837d8932e3eb37bd5ca71820_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08403f2e837d8932e3eb37bd5ca71820_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08403f2e837d8932e3eb37bd5ca71820_JaffaCakes118
-
Size
1.1MB
-
MD5
08403f2e837d8932e3eb37bd5ca71820
-
SHA1
73eef1ecadeae14cc0f47d6c1e87da66377ab7a5
-
SHA256
c09a825c7d38a966ae1ae05cf32534089dee33749b16686c96b5df8d7b030380
-
SHA512
5264296368666f1474912a55f96d362c58597bedf27d187e085e0d6a3c80a6939cd9c5f5df75f9ed0658e19aa3bba66e9e9b16fbe4848d6e309c6471efe3a6db
-
SSDEEP
12288:+6H4LCCh5tlPRkHIdfcW+6DpCovNi7ZBc2u0AhDCkBR6eeb3MJrs3MJrKd6eJH:+qmPhDlPiHIdfcMpq7U2uJLBR60rzrjI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08403f2e837d8932e3eb37bd5ca71820_JaffaCakes118
Files
-
08403f2e837d8932e3eb37bd5ca71820_JaffaCakes118.exe windows:5 windows x86 arch:x86
84bd1dd45128b7f6bdb858a5b6c7dcc6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dbghelp
MiniDumpWriteDump
kernel32
SetErrorMode
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
GetModuleHandleW
WritePrivateProfileStringA
GetCurrentDirectoryA
ReadFile
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
HeapAlloc
HeapFree
TerminateProcess
UnhandledExceptionFilter
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
RtlUnwind
VirtualAlloc
HeapReAlloc
ExitThread
GetFileSizeEx
GetFileType
HeapSize
GetACP
IsValidCodePage
SetHandleCount
GetStdHandle
GetConsoleCP
GetConsoleMode
VirtualFree
HeapCreate
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetDriveTypeA
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetFileAttributesA
GetFileAttributesExA
GetThreadLocale
LocalAlloc
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
CreateEventA
SuspendThread
SetEvent
ResumeThread
FindFirstFileA
FileTimeToSystemTime
FindNextFileA
FindClose
GetModuleFileNameW
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
FileTimeToLocalFileTime
GetFileTime
IsDebuggerPresent
GetSystemInfo
RaiseException
WriteFile
GetSystemTimeAsFileTime
VirtualQuery
SetFilePointer
GlobalMemoryStatus
GetFileSize
FileTimeToDosDateTime
GlobalUnlock
GlobalFree
GlobalLock
MapViewOfFile
CreateFileMappingA
GetSystemDirectoryA
UnmapViewOfFile
FreeResource
CreateMutexA
ReleaseMutex
MoveFileA
lstrcpynA
MulDiv
SetLastError
Module32Next
Module32First
DeviceIoControl
CreateFileA
QueryDosDeviceW
SetProcessWorkingSetSize
VirtualProtect
lstrlenW
SetThreadPriority
GetThreadPriority
GetCurrentThread
FlushInstructionCache
InterlockedIncrement
GetPrivateProfileIntA
GetLastError
ExpandEnvironmentStringsA
InterlockedDecrement
MultiByteToWideChar
Sleep
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
GetTickCount
DeleteCriticalSection
InitializeCriticalSection
GlobalAlloc
SetUnhandledExceptionFilter
OpenThread
GetCommandLineA
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetVersionExA
Process32Next
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
ExitProcess
CreateThread
WaitForSingleObject
CloseHandle
lstrlenA
lstrcatA
lstrcpyA
FreeLibrary
LoadLibraryA
GetWindowsDirectoryA
CreateProcessA
LocalFree
FormatMessageA
OutputDebugStringA
GetPrivateProfileStringA
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
SetStdHandle
user32
CharUpperA
RegisterClipboardFormatA
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
TranslateAcceleratorA
SetWindowContextHelpId
MapDialogRect
GetMessageA
GetActiveWindow
ValidateRect
GetCursorPos
WindowFromPoint
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
RemovePropA
SetFocus
GetWindowTextLengthA
GetLastActivePopup
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
MessageBeep
ScrollWindow
ReuseDDElParam
GetKeyState
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
MessageBoxA
CreateWindowExA
GetClassInfoExA
RegisterClassA
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
GetWindowPlacement
GetWindow
PostThreadMessageA
wvsprintfA
AdjustWindowRectEx
FillRect
wsprintfA
GetMenuItemID
OffsetRect
SystemParametersInfoA
CopyRect
UnhookWindowsHookEx
TrackPopupMenuEx
IntersectRect
GetDesktopWindow
GetSubMenu
GetMenuStringA
GetMenuItemInfoA
GetMenuItemCount
LoadMenuA
ClientToScreen
FindWindowExA
DispatchMessageA
TranslateMessage
PeekMessageA
CallNextHookEx
SetPropA
GetClassNameA
DefWindowProcW
SetWindowLongW
CallWindowProcW
GetPropA
GetNextDlgGroupItem
GetSysColorBrush
UnregisterClassA
CharNextA
InvalidateRgn
CopyAcceleratorTableA
RegisterWindowMessageA
SetWindowsHookExA
GetWindowLongA
SetWindowRgn
IsZoomed
SetRect
UnionRect
IsRectEmpty
ShowOwnedPopups
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
MapWindowPoints
UnpackDDElParam
PostQuitMessage
IsWindowVisible
SetForegroundWindow
AttachThreadInput
TrackPopupMenu
GetForegroundWindow
GetKeyboardState
CheckMenuItem
GetClassInfoA
DestroyMenu
SetWindowPos
DrawIcon
IsIconic
EnumWindows
UpdateWindow
GetWindowTextA
GetWindowThreadProcessId
DrawIconEx
GetSystemMetrics
DestroyIcon
SetTimer
ScreenToClient
GetMessagePos
KillTimer
CopyIcon
ReleaseDC
InvalidateRect
GetSysColor
IsWindow
SetCapture
RedrawWindow
ReleaseCapture
PtInRect
SetWindowLongA
FindWindowA
GetWindowRect
GetFocus
IsChild
GetParent
PostMessageA
LoadCursorA
SetCursor
InflateRect
GetDC
GetClientRect
LoadIconA
SendMessageA
EnableWindow
gdi32
CreatePatternBrush
GetWindowExtEx
CreatePen
CreateSolidBrush
DeleteDC
CreateRectRgnIndirect
GetMapMode
DPtoLP
CreateEllipticRgn
LPtoDP
Ellipse
GetRgnBox
ExtSelectClipRgn
GetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
PatBlt
GetTextMetricsA
IntersectClipRect
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetTextColor
GetClipBox
CreateBitmap
CreateCompatibleBitmap
GetTextColor
DeleteObject
BitBlt
CreateCompatibleDC
SelectObject
Rectangle
GetDeviceCaps
SetBkColor
GetBkColor
GetTextExtentPoint32A
CreateFontIndirectA
GetObjectA
GetStockObject
GetPixel
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
SetSecurityDescriptorDacl
RegEnumKeyA
RegDeleteKeyA
GetUserNameA
InitializeSecurityDescriptor
RegOpenKeyA
RegQueryValueA
RegCreateKeyA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteA
DragFinish
DragQueryFileA
SHGetSpecialFolderPathA
comctl32
ImageList_LoadImageA
InitCommonControlsEx
shlwapi
PathFindExtensionA
UrlUnescapeA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
StrStrW
oledlg
ord8
ole32
CoGetInterfaceAndReleaseStream
CLSIDFromString
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoDisconnectObject
CoUninitialize
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoInitialize
CoRegisterMessageFilter
OleFlushClipboard
CoRevokeClassObject
OleIsCurrentClipboard
oleaut32
LoadTypeLi
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
LoadRegTypeLi
DispCallFunc
SysFreeString
SysAllocStringLen
VariantClear
VariantInit
SysStringLen
SysAllocString
VariantChangeType
VariantCopy
SysAllocStringByteLen
wininet
FindFirstUrlCacheEntryA
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
GetUrlCacheEntryInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
psapi
GetModuleInformation
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 359KB - Virtual size: 358KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
MyHotWor Size: 250KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 392KB - Virtual size: 391KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ