d:\LocalSvnForDailyBuild\dabingusa_beta\Bin\Release\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
403b991ec03a85efa5fa34416928a22a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
403b991ec03a85efa5fa34416928a22a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
403b991ec03a85efa5fa34416928a22a_JaffaCakes118
-
Size
328KB
-
MD5
403b991ec03a85efa5fa34416928a22a
-
SHA1
218c0e47cac2f2ce0ef9686291c983338a7cee2a
-
SHA256
b998d631226f0521da2d74f945452902a8e8622c33f3cc0648f361746ca8f5db
-
SHA512
66f4a9ba7d8ab214e14ac961fb60e8bc204f6b71141c54ef8d73c883c7d97d139097520caf947b7d66bfb385051e68467905b067bfe5e462008c16d7e7f16bbd
-
SSDEEP
6144:/9h7qduEIwqllG7sOC12C+g0PRToNvId3WK9d:VwwXOnY0Z9N7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 403b991ec03a85efa5fa34416928a22a_JaffaCakes118
Files
-
403b991ec03a85efa5fa34416928a22a_JaffaCakes118.exe windows:4 windows x86 arch:x86
d3879bf2154d4bef8047cf4762271038
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
GetFullPathNameA
SetErrorMode
GetSystemTimeAsFileTime
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitProcess
RtlUnwind
RaiseException
WriteConsoleW
WriteFile
GetStdHandle
HeapSize
GetACP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
LoadLibraryW
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetDriveTypeA
LCMapStringA
LCMapStringW
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
SetStdHandle
SetEnvironmentVariableA
ReadFile
GetCurrentDirectoryA
GetThreadLocale
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
SetLastError
lstrcmpW
GetModuleHandleA
GetProcAddress
GetVersionExA
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetFileSize
GetVersion
InterlockedExchange
lstrlenA
CompareStringA
MultiByteToWideChar
CompareStringW
GetTickCount
WritePrivateProfileStringA
GetModuleFileNameA
GetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
CreateProcessA
SetCurrentDirectoryA
CopyFileA
Sleep
WriteProfileStringA
DeleteFileA
GetProfileStringA
GetCurrentThreadId
GetFileType
CreateFileW
user32
ShowWindow
SetWindowTextA
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowThreadProcessId
IsWindowEnabled
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
CopyRect
UnregisterClassA
LoadCursorA
GetSysColorBrush
GetMenuCheckMarkDimensions
DestroyMenu
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
MessageBoxA
LoadIconA
EnableWindow
GetClientRect
GetSystemMetrics
SendMessageA
IsIconic
GetClassNameA
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shlwapi
PathFindExtensionA
PathFindFileNameA
PathFileExistsA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 244KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ