D:\Data\公司资料\项目\应用程序\无极\静默包\文字版静默\Release\SetupApp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
17e7ba58934b01d063b1e6b5326678bf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17e7ba58934b01d063b1e6b5326678bf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
17e7ba58934b01d063b1e6b5326678bf_JaffaCakes118
-
Size
865KB
-
MD5
17e7ba58934b01d063b1e6b5326678bf
-
SHA1
aac01128c9bcf7aba45d3533233f0d26ea1dcfaa
-
SHA256
dd106c04aa70b911932fd92b444eb1fa0bc9639041f34507051f521797dba9a2
-
SHA512
8397189caaea61ca1aafc02c64de122a59b3d1780fe5e223b48bb397edecc317d01bbff97d35dbaf374df7a545b9cc113abdc7f593763cb04474a87a138771fb
-
SSDEEP
24576:293GUEBsLmj9l6M2WJ7dcEtfKIQ6eylnSNMKkmSg:293GUosLQepwxp7Q+SJMg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17e7ba58934b01d063b1e6b5326678bf_JaffaCakes118
Files
-
17e7ba58934b01d063b1e6b5326678bf_JaffaCakes118.exe windows:5 windows x86 arch:x86
13d177083fa869f495787588da51e19a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TerminateThread
Sleep
MultiByteToWideChar
WideCharToMultiByte
GetACP
FindResourceA
FreeResource
LoadResource
SizeofResource
GetFileAttributesA
WritePrivateProfileStringA
LockResource
OutputDebugStringA
GetSystemTime
DosDateTimeToFileTime
CreateFileA
SetFilePointer
SystemTimeToFileTime
SetFileTime
WriteFile
ReadFile
GetFileType
CloseHandle
GetCurrentDirectoryW
GetFullPathNameA
GetDriveTypeW
FlushFileBuffers
CreateFileW
WriteConsoleW
SetStdHandle
IsProcessorFeaturePresent
GetStringTypeW
GetConsoleMode
GetConsoleCP
HeapSize
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapCreate
LCMapStringW
WinExec
GetModuleHandleA
GetModuleFileNameA
SetFileAttributesA
CreateDirectoryA
TerminateProcess
OpenProcess
GetCurrentProcess
IsValidCodePage
GetOEMCP
GetCPInfo
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetStdHandle
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapReAlloc
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleW
GetProcAddress
EncodePointer
GetSystemTimeAsFileTime
ExitThread
GetCurrentThreadId
GetLastError
CreateThread
DecodePointer
user32
ShowWindow
SetWindowPos
GetDlgItem
MessageBoxA
TranslateMessage
BeginPaint
IsDlgButtonChecked
GetClientRect
SendDlgItemMessageA
DispatchMessageA
CreateDialogParamA
GetMessageA
DestroyWindow
EndPaint
wvsprintfA
FindWindowA
PostMessageA
SetDlgItemTextA
GetDlgItemTextA
GetSystemMetrics
PostQuitMessage
LoadImageA
SendMessageA
EnableWindow
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHBrowseForFolderA
ole32
CoCreateInstance
CoTaskMemFree
gdiplus
GdipDeleteBrush
GdipDeletePen
GdipCreateBitmapFromHICON
GdipDeleteFont
GdipDeleteGraphics
GdipDeleteFontFamily
GdipCreateSolidFill
GdipDrawImageI
GdipDisposeImage
GdipCreateFont
GdipDrawString
GdipCreateFontFamilyFromName
GdipCreateFromHDC
GdipFillRectangleI
GdipDrawLineI
GdipCreatePen1
GdiplusStartup
shlwapi
PathFileExistsA
PathRemoveBackslashA
PathStripPathA
psapi
GetModuleFileNameExA
EnumProcessModules
EnumProcesses
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ