e:\projects\windows\GooglePasswordDecryptor\Release\GooglePasswordDecryptor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
25d1a37fe1ae0cde79936b34885ccdfe_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
25d1a37fe1ae0cde79936b34885ccdfe_JaffaCakes118
-
Size
1.5MB
-
MD5
25d1a37fe1ae0cde79936b34885ccdfe
-
SHA1
d7502435f15c538a02586cd20a63ea237dee0ede
-
SHA256
453fcc64870bd179912f1e81cac25ba64f261125f113ef7ed8acbb151f716ab4
-
SHA512
be715fffad28b0af63fc64b2726cbc4a3fea79a55a0744cb6188c8b8a559f7c4380ffec40dfa0a95faf1ee616fd8ec6614c1483f26db64de684aecdc6c2bdb77
-
SSDEEP
24576:65i0PhNE7YwOff42jf5K+w7S4EySUeXP5cMZWyVjkcU51ScUkI2NK:65iuNE7Y7/f5gEySXXPG4jkcU51aaK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25d1a37fe1ae0cde79936b34885ccdfe_JaffaCakes118
Files
-
25d1a37fe1ae0cde79936b34885ccdfe_JaffaCakes118.exe windows:5 windows x86 arch:x86
93a974239ca4d017bed59d5c1534e025
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileTime
HeapReAlloc
GetStartupInfoA
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
VirtualFree
HeapCreate
GetFileSizeEx
GetStdHandle
SetHandleCount
GetFileType
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringW
SetEnvironmentVariableA
FileTimeToLocalFileTime
SetErrorMode
GetVolumeInformationA
DuplicateHandle
FileTimeToSystemTime
GetModuleHandleW
GetThreadLocale
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GlobalFree
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
InterlockedExchange
GlobalAlloc
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GlobalLock
GlobalUnlock
MulDiv
GetModuleFileNameW
AreFileApisANSI
GetSystemTime
GetCurrentProcessId
DeleteFileW
GetVersionExA
GetCurrentThreadId
DeleteCriticalSection
GetDiskFreeSpaceA
GetDiskFreeSpaceW
EnterCriticalSection
LockFileEx
GetTempPathW
FlushFileBuffers
MultiByteToWideChar
CreateFileW
ReadFile
GetFileAttributesW
LeaveCriticalSection
Sleep
LoadLibraryW
InitializeCriticalSection
WriteFile
FormatMessageA
GetSystemTimeAsFileTime
GetTickCount
LockFile
UnlockFile
QueryPerformanceCounter
InterlockedDecrement
InterlockedIncrement
SetEndOfFile
SetFilePointer
GetFileSize
GetFullPathNameA
GetFullPathNameW
SetDllDirectoryA
GetSystemWindowsDirectoryA
WaitForSingleObject
FindClose
FindNextFileA
FindFirstFileA
UnmapViewOfFile
VirtualQuery
MapViewOfFile
CreateFileMappingA
CreateFileA
DeleteFileA
CopyFileA
GetTempPathA
LocalFree
lstrcpynA
lstrcmpA
GetCommandLineA
ExitProcess
SizeofResource
WideCharToMultiByte
lstrlenA
LoadLibraryA
GetProcAddress
SetLastError
FreeLibrary
CloseHandle
GetModuleHandleA
LockResource
GetLastError
CreateProcessA
GetFileAttributesA
GetProcessHeap
GetCurrentThread
HeapFree
GetCurrentProcess
HeapAlloc
LoadResource
FindResourceA
user32
CharUpperA
MessageBeep
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
UnregisterClassA
DestroyMenu
GetMessageA
TranslateMessage
ValidateRect
GetWindowThreadProcessId
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
GetSysColor
EnableWindow
LoadImageA
SendMessageA
UpdateWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindow
EndPaint
BeginPaint
GetWindowDC
ScreenToClient
GrayStringA
DrawTextExA
RegisterClipboardFormatA
DrawTextA
TabbedTextOutA
PostThreadMessageA
GetLastActivePopup
GetClientRect
LoadIconA
GetSystemMenu
AppendMenuA
LoadCursorA
ReleaseCapture
RedrawWindow
InvalidateRect
SetWindowLongA
PtInRect
GetParent
SetCapture
SetCursor
DestroyIcon
PostMessageA
GetCursorPos
GetWindowLongA
OffsetRect
DrawStateA
InflateRect
GetCapture
GetIconInfo
SetRectEmpty
DrawEdge
WindowFromPoint
GetWindowRect
GetNextDlgGroupItem
ClientToScreen
UnhookWindowsHookEx
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
GetFocus
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
IsWindow
ReleaseDC
GetDC
CopyRect
gdi32
GetBkColor
GetTextColor
GetRgnBox
GetMapMode
GetDeviceCaps
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
PtVisible
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
GetWindowExtEx
GetViewportExtEx
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateRectRgnIndirect
CreateBitmap
SetDIBitsToDevice
SelectObject
SetStretchBltMode
CreateFontIndirectA
GetObjectA
GetStockObject
BitBlt
CreateCompatibleBitmap
TextOutA
DeleteObject
CreateCompatibleDC
CreateFontA
RectVisible
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
CryptDeriveKey
CryptGetHashParam
OpenProcessToken
OpenThreadToken
GetTokenInformation
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegEnumValueA
CredFree
CredEnumerateA
RegEnumKeyExA
CryptDecrypt
RegQueryValueExA
GetUserNameA
CryptHashData
RegCloseKey
CryptDestroyHash
CryptCreateHash
RegOpenKeyExA
CryptAcquireContextA
CryptReleaseContext
LookupAccountSidA
shell32
SHGetFolderPathA
ShellExecuteA
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitializeEx
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
CreateILockBytesOnHGlobal
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysFreeString
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
GetErrorInfo
winhttp
WinHttpSendRequest
WinHttpReadData
WinHttpOpenRequest
WinHttpOpen
WinHttpQueryDataAvailable
WinHttpCloseHandle
WinHttpConnect
WinHttpReceiveResponse
crypt32
CryptUnprotectData
Sections
.text Size: 671KB - Virtual size: 670KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 738KB - Virtual size: 738KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ