FreeCell.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1343e9786729be69078f1e64ea740aae_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1343e9786729be69078f1e64ea740aae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1343e9786729be69078f1e64ea740aae_JaffaCakes118
-
Size
867KB
-
MD5
1343e9786729be69078f1e64ea740aae
-
SHA1
86f1051369dd824702323cd70b274d8938505985
-
SHA256
1560417ddaf9a2eb255f300a75df164bfa38f557b01ed6e1d1151f38d487b2ef
-
SHA512
10e3036a663cfa87ddd482f8b2c51d6ae34f0384c01c175b94ba236e2615f4190011383adfc6fed6d12e0da5e9794b8eba8fb5cb94b8c0da4a864a7e264d5917
-
SSDEEP
12288:PtfEGMAqEUUVY3QwQsQ+bfOTfvKvklyr1BUAhl2fgNxbk0vBWUQj7kq:PwAqEUUVYNQsLWT8N37vBaj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1343e9786729be69078f1e64ea740aae_JaffaCakes118
Files
-
1343e9786729be69078f1e64ea740aae_JaffaCakes118.exe windows:6 windows x86 arch:x86
c7c8230ce0f8a43b9d4fd05324049a3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
IsProcessorFeaturePresent
GetSystemInfo
UnmapViewOfFile
CreateFileA
OutputDebugStringA
VirtualAlloc
VirtualFree
HeapAlloc
GetProcessHeap
HeapFree
GetVersionExA
DeleteCriticalSection
LoadLibraryA
InterlockedCompareExchange
DelayLoadFailureHook
InterlockedExchange
Sleep
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
ExitProcess
SleepEx
OutputDebugStringW
SetCurrentDirectoryW
GetModuleFileNameW
RegisterApplicationRestart
GetCommandLineW
GetLastError
CreateMutexW
GetVersionExW
LoadLibraryW
QueryPerformanceFrequency
FlushInstructionCache
RaiseException
EnterCriticalSection
LeaveCriticalSection
MulDiv
SetLastError
MultiByteToWideChar
DeleteFileW
GetCurrentDirectoryW
GetFileSize
ReadFile
WriteFile
SetFilePointer
MoveFileExW
GetFileAttributesW
CreateDirectoryW
InterlockedIncrement
InterlockedDecrement
WaitForSingleObject
WideCharToMultiByte
CreateEventW
LoadLibraryExW
LockResource
LoadResource
SizeofResource
FindResourceW
WriteConsoleW
GetFileType
GetStdHandle
DebugBreak
ExpandEnvironmentStringsW
GlobalFree
GlobalAlloc
FreeResource
FormatMessageW
LocalAlloc
GetThreadLocale
FindResourceExW
CreateThread
FreeLibrary
GetProcAddress
LocalFree
CreateFileW
CloseHandle
GetLocaleInfoW
HeapSetInformation
GetTickCount
GetModuleHandleW
InitializeCriticalSection
user32
SetWindowPos
GetWindowRect
KillTimer
IsIconic
GetSystemMetrics
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
PeekMessageW
ShowWindow
SetTimer
DestroyWindow
UnhookWindowsHookEx
LoadAcceleratorsW
RegisterRawInputDevices
SetProcessDPIAware
SetForegroundWindow
BringWindowToTop
FindWindowW
MonitorFromWindow
SetRect
GetKeyState
InvalidateRect
GetClientRect
NotifyWinEvent
GetCursorPos
SetWindowLongW
GetClassInfoExW
LoadCursorW
SetClassLongW
SetCursor
SetMenuInfo
SetMenuItemInfoW
GetMenuItemInfoW
GetMenuItemCount
TrackPopupMenu
FillRect
GetSysColor
EqualRect
UnionRect
GetMonitorInfoW
MonitorFromRect
SendInput
SetWindowPlacement
IsWindowVisible
GetWindowPlacement
CallNextHookEx
OffsetRect
IsZoomed
EnumDisplayMonitors
ReleaseDC
GetDoubleClickTime
ShowCursor
DefWindowProcW
SetWindowTextW
SetMenu
IsRectEmpty
IntersectRect
GetRawInputData
GetForegroundWindow
DrawFrameControl
PtInRect
ScreenToClient
PostQuitMessage
ReleaseCapture
EndPaint
GetSysColorBrush
BeginPaint
SystemParametersInfoW
RegisterClassExW
CreateWindowExW
GetSubMenu
SetWindowsHookExW
RegisterClassW
RegisterWindowMessageW
GetWindowLongW
DrawTextW
CallWindowProcW
GetParent
AdjustWindowRect
GetIconInfo
MessageBoxW
GetWindow
GetClassNameW
GetNextDlgGroupItem
GetDlgCtrlID
EndDialog
GetWindowTextW
MapWindowPoints
DrawEdge
IsWindowEnabled
EnumChildWindows
SetWindowRgn
IsDialogMessageW
GetNextDlgTabItem
CreateDialogParamW
CreateDialogIndirectParamW
DialogBoxParamW
GetProcessDefaultLayout
SetFocus
SendDlgItemMessageW
RedrawWindow
GetFocus
SetDlgItemInt
IsDlgButtonChecked
GetDlgItem
EnableWindow
SendMessageW
LoadStringW
SetCapture
DrawMenuBar
DestroyMenu
GetMenu
LoadMenuW
PostMessageW
LoadIconW
UnregisterClassA
TrackMouseEvent
EnableMenuItem
GetDC
msvcrt
_ftol2_sse
_CIlog
memmove
strncmp
_errno
_CIpow
floor
wcstoul
wcsncat_s
wcsspn
memcpy
_ftol2
wcscspn
qsort
wcscat_s
wcsnlen
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
?_set_new_mode@@YAHH@Z
_vsnwprintf_s
_wcsicmp
_CIatan
wcstod
_vscwprintf
memmove_s
_wcsnicmp
_controlfp
_except_handler4_common
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
malloc
_callnewh
_CxxThrowException
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@XZ
wcsncmp
time
memset
srand
swprintf_s
_snwprintf_s
wcscpy_s
wcschr
_wtoi
wcsncpy_s
_purecall
wcstol
rand
realloc
free
__CxxFrameHandler3
_CIsqrt
_CIacos
_CIatan2
_CIsin
_finite
_strdup
setlocale
iswpunct
iswdigit
iswalpha
iswspace
ntdll
WinSqmAddToStream
shell32
SHGetFolderPathEx
CommandLineToArgvW
SHGetFolderPathW
SHSetLocalizedName
ShellExecuteW
ShellAboutW
winmm
timeGetTime
timeBeginPeriod
timeEndPeriod
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
GetUserNameW
gdi32
GetDeviceCaps
GetTextExtentPoint32W
SetBkColor
SetBkMode
AddFontResourceW
GetStockObject
ExcludeClipRect
CreateRoundRectRgn
GetObjectA
CreatePen
Rectangle
GetBkColor
GetTextColor
SetTextColor
SaveDC
RestoreDC
CreateFontW
CreateSolidBrush
CreateFontIndirectW
PatBlt
DeleteObject
ExtTextOutW
CreateCompatibleDC
CreateBitmap
MoveToEx
ExtTextOutA
SetMapMode
SetTextAlign
CreateFontIndirectA
GetFontLanguageInfo
GetTextMetricsW
GetCharacterPlacementW
GetCharacterPlacementA
CreateDIBSection
GetGlyphOutlineA
GetTextMetricsA
GetObjectW
SelectObject
DeleteDC
RemoveFontResourceW
BitBlt
oleaut32
SysStringLen
SysAllocString
VariantInit
SysFreeString
ole32
CoCreateInstance
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
shlwapi
PathCombineW
PathFileExistsW
comctl32
ImageList_Destroy
ImageList_Create
ImageList_Add
InitCommonControlsEx
gdiplus
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipCreateRegionHrgn
GdipSetClipRegion
GdipSetClipRectI
GdipDrawImageRectRectI
GdipDrawImagePointRectI
GdipMeasureString
GdipFillRegion
GdipFillRectangleI
GdipDrawRectangleI
GdipDrawRectangle
GdipDrawLineI
GdipReleaseDC
GdipGetDC
GdipCreateFromHDC
GdipSetStringFormatHotkeyPrefix
GdipSetPenDashStyle
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
GdipDisposeImage
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCloneImage
GdipDeleteBrush
GdipCreateStringFormat
GdipDeleteStringFormat
GdipDeleteGraphics
GdipDeleteFont
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipCreateBitmapFromScan0
GdipCreateHBITMAPFromBitmap
GdipCreateSolidFill
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipGetImageGraphicsContext
GdipSetTextRenderingHint
GdipDrawString
GdipDrawImageRectI
GdipCloneBrush
GdipCreateImageAttributes
GdipDisposeImageAttributes
GdipCreatePen1
GdipDeletePen
GdipDeleteRegion
GdipImageRotateFlip
GdipSetImageAttributesWrapMode
GdipCreateLineBrushFromRectI
secur32
GetUserNameExW
d3d9
Direct3DCreate9
dsound
ord11
oleacc
AccessibleChildren
AccessibleObjectFromWindow
LresultFromObject
CreateStdAccessibleProxyW
xinput9_1_0
XInputGetState
wtsapi32
WTSRegisterSessionNotification
WTSUnRegisterSessionNotification
slc
SLGetWindowsInformationDWORD
usp10
ScriptItemize
ScriptBreak
Sections
.text Size: 527KB - Virtual size: 526KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 160KB - Virtual size: 420KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE