c:\DQN\CAPCOM\SetupTool\Bio4SetupTool\Release\Bio4SetupTool.pdb
Static task
static1
Behavioral task
behavioral1
Sample
08b572870b5e8fba034a5a45ab162e85_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08b572870b5e8fba034a5a45ab162e85_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08b572870b5e8fba034a5a45ab162e85_JaffaCakes118
-
Size
196KB
-
MD5
08b572870b5e8fba034a5a45ab162e85
-
SHA1
99c81f295bcadab2978901461287a3705243666e
-
SHA256
ac85657520ef222b500b156fe57dc7713a91ba594f7c7f2ac34341725a16e30b
-
SHA512
a29d656f0314100c17136a14958f72ff0429aa7a56ff1ce2ff1b864ae5db2094da1277eab149b54a46715a24aefb44a71286d4da9a959a74cdbd8529595a3b3a
-
SSDEEP
3072:03IXrV8JHdcVA7lOxLK2DHMBRwkovd5Mv4+CUgUyTidOym1SwmmlE/Z/b3UnKF:CcO9Gxu2LACkovd5qrg1TidOix/Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08b572870b5e8fba034a5a45ab162e85_JaffaCakes118
Files
-
08b572870b5e8fba034a5a45ab162e85_JaffaCakes118.exe windows:4 windows x86 arch:x86
6431186ccc22929edc23b65aa72f9677
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadFile
SetStdHandle
GetOEMCP
GetACP
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
HeapSize
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
VirtualQuery
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetSystemDefaultLangID
GetCurrentProcess
TerminateProcess
SetFilePointer
FlushFileBuffers
WriteFile
SetUnhandledExceptionFilter
GetProcAddress
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
CreateFileA
SetEndOfFile
OutputDebugStringA
GetModuleHandleA
GetEnvironmentStrings
WritePrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
CreateMutexA
GetTickCount
QueryPerformanceCounter
HeapAlloc
GetCPInfo
LCMapStringW
GetLastError
ReleaseMutex
GetStdHandle
CloseHandle
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
HeapFree
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
GetVersionExA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
user32
FillRect
GetClassInfoA
DestroyMenu
CallWindowProcA
GetMessageA
WindowFromPoint
IsChild
ScreenToClient
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
DialogBoxParamA
CreateDialogParamA
ShowWindow
SetWindowLongA
GetWindowLongA
MoveWindow
CreateWindowExA
DefWindowProcA
BeginPaint
EndPaint
GetMenu
GetClientRect
GetParent
SetFocus
InvalidateRect
GetSysColorBrush
EndDialog
KillTimer
MessageBoxA
DestroyWindow
PostQuitMessage
GetWindowRect
SetWindowPos
LoadImageA
SendMessageA
GetDlgItem
EnableWindow
LoadStringA
GetSubMenu
SetMenuItemInfoA
DrawMenuBar
SetTimer
DefDlgProcA
LoadCursorA
RegisterClassA
UnregisterClassA
FindWindowA
SetForegroundWindow
wsprintfA
gdi32
IntersectClipRect
MoveToEx
LineTo
GetStockObject
CreateSolidBrush
SetBkMode
SetTextColor
SetBkColor
ExcludeClipRect
shell32
ShellExecuteA
d3d9
Direct3DCreate9
dinput8
DirectInput8Create
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ