d:\Source++\###NetNucleus\###Cleaning\FP\0611\Flipopia_recover_only(2010-11-05)\code\projets\contextuel_popper\exe\src\SAccRecover\Release_FP\FPRecover.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2ae81876d31de3ce31c5c41bca72cf5b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ae81876d31de3ce31c5c41bca72cf5b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2ae81876d31de3ce31c5c41bca72cf5b_JaffaCakes118
-
Size
308KB
-
MD5
2ae81876d31de3ce31c5c41bca72cf5b
-
SHA1
9f864ee64525b132445b2a49f042d6dd67a90e87
-
SHA256
e6ea0cee004c9fdc877511678a8f137831d586e08c5f6beb7ba95570be065ad3
-
SHA512
6c9a77002856be2a7ac61fcb81d4d33a3f9e29d6863f50a33a9d98ead7c7d8c3593f279f9cfab428b25cf546e5613aeed5eca9fa4a0e59f7cb4548f267cbeda7
-
SSDEEP
6144:ZbozYl6aUmcjI8H2stkv0bUIBWm271Yycr1EsYbg:ZszqmLtJzg71livt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ae81876d31de3ce31c5c41bca72cf5b_JaffaCakes118
Files
-
2ae81876d31de3ce31c5c41bca72cf5b_JaffaCakes118.exe windows:4 windows x86 arch:x86
9f91929c76e718b12866e8b368f31478
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathStripToRootW
SHGetValueW
PathFindFileNameW
PathIsUNCW
wininet
InternetConnectW
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
HttpQueryInfoW
InternetReadFile
InternetOpenW
kernel32
InterlockedDecrement
GetVersion
GetModuleHandleA
GetFileAttributesW
GetFileTime
lstrcmpW
GlobalFlags
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
CompareStringA
GetLocaleInfoW
RaiseException
RtlUnwind
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
IsDebuggerPresent
HeapReAlloc
HeapSize
Sleep
GetStdHandle
GetModuleFileNameA
SetStdHandle
GetFileType
SetHandleCount
CreateFileA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
ReleaseSemaphore
CreateSemaphoreW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
CompareStringW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetLocalTime
FindFirstFileW
GetCurrentThreadId
InterlockedIncrement
InterlockedCompareExchange
ReleaseMutex
WaitForSingleObject
LocalFree
FormatMessageW
GetSystemTime
GetCurrentProcessId
WideCharToMultiByte
SetLastError
FreeLibrary
LoadLibraryW
GetProcAddress
CreateMutexW
GetTempPathW
CreateFileW
GetModuleFileNameW
lstrlenW
WriteFile
CloseHandle
GetSystemTimeAsFileTime
MultiByteToWideChar
GetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
GetCommandLineA
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetWindowPos
SetWindowLongW
IsWindow
GetDlgItem
GetFocus
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
SetWindowsHookExW
CallNextHookEx
GetKeyState
PeekMessageW
ValidateRect
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowTextW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
CharUpperW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
RegisterWindowMessageW
DefWindowProcW
PostQuitMessage
MessageBoxW
DispatchMessageW
UnregisterClassA
gdi32
DeleteDC
CreateBitmap
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
GetClipBox
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
ole32
CoInitializeEx
oleaut32
VariantInit
VariantChangeType
VariantClear
Exports
Exports
InetFunctionForRecover
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ