d:\Sources\Personal\CopyLock\Release\CopyLock.pdb
Static task
static1
Behavioral task
behavioral1
Sample
412c91d3f74240953e658dfda47bc1b9_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
412c91d3f74240953e658dfda47bc1b9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
412c91d3f74240953e658dfda47bc1b9_JaffaCakes118
-
Size
244KB
-
MD5
412c91d3f74240953e658dfda47bc1b9
-
SHA1
3013a3a6e3a1ba8a3016c32cf95d21dc22939eac
-
SHA256
6eb3dec1f9d5d1690a4267c94447c0c94e93107336caa93ac37c29459f85b9d2
-
SHA512
2c7d20d3c56ac39953652c7acc6e51e63b18af725c83226a1bac46de4116232a47b4c6be0d38e5cae65e59dc68b5da6bea1380d0f463a73ba456a57b4dbdf4d4
-
SSDEEP
3072:xMZ90h4hhVz7ier1VL9LyTyULElBKFEnuR9tDtrZCc/IlAMO/Ys+VbWqwmUj/ml6:EXhao75+TElBKFEu9DtZ1YAC+2a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 412c91d3f74240953e658dfda47bc1b9_JaffaCakes118
Files
-
412c91d3f74240953e658dfda47bc1b9_JaffaCakes118.exe windows:4 windows x86 arch:x86
5fa2875e89debbc8cef8a4f42c5a7067
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
RtlUnwind
ExitProcess
GetTimeFormatA
GetDateFormatA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
SetErrorMode
GetFileTime
FileTimeToLocalFileTime
GetOEMCP
GetCPInfo
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
UnlockFile
LockFile
FlushFileBuffers
WriteFile
ReadFile
GlobalFlags
FileTimeToSystemTime
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
InterlockedDecrement
WritePrivateProfileStringA
GetPrivateProfileIntA
FreeResource
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
GlobalDeleteAtom
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
FormatMessageA
LocalFree
FindFirstFileA
FindNextFileA
FindClose
GetSystemDirectoryA
GetCurrentProcess
MoveFileExA
GetShortPathNameA
CreateFileA
GetFileSize
CreateFileMappingA
SetLastError
MapViewOfFile
UnmapViewOfFile
SetFilePointer
SetEndOfFile
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
MultiByteToWideChar
OpenProcess
CloseHandle
TerminateProcess
GetModuleHandleA
GetProcAddress
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
lstrcatA
WinExec
GetFileAttributesA
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
GetLastError
CopyFileA
MoveFileA
GetModuleFileNameA
GetLocalTime
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
LCMapStringW
InterlockedExchange
user32
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetForegroundWindow
GetMenu
AdjustWindowRectEx
ScreenToClient
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
GetWindowPlacement
GetWindow
SystemParametersInfoA
DestroyMenu
CopyRect
UnhookWindowsHookEx
GetWindowTextLengthA
GetWindowTextA
SetFocus
ShowWindow
GetDlgCtrlID
SetWindowTextA
SetDlgItemTextA
SendDlgItemMessageA
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
ModifyMenuA
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
MessageBoxA
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
PostQuitMessage
UnregisterClassA
GetMenuState
GetMenuItemID
GetMenuItemCount
ExitWindowsEx
wsprintfA
wvsprintfA
CharUpperA
EnumWindows
WindowFromPoint
GetSysColorBrush
MsgWaitForMultipleObjects
GetWindowThreadProcessId
SetWindowLongA
LoadCursorA
CopyIcon
MessageBeep
DestroyCursor
IsWindow
ReleaseCapture
SetCapture
RedrawWindow
UpdateWindow
IsDialogMessageA
PtInRect
SetCursor
GetSysColor
FillRect
SetMenuDefaultItem
EnableMenuItem
GetFocus
GetParent
ReleaseDC
GetDC
InflateRect
GetSystemMetrics
LoadAcceleratorsA
LoadIconA
EnableWindow
GetClientRect
GetWindowRect
IsIconic
PostMessageA
SendMessageA
LoadMenuA
GetSubMenu
DrawIcon
TranslateAcceleratorA
SetWindowPos
gdi32
CreateSolidBrush
DeleteObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
CreateFontIndirectA
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
ExtTextOutA
CreateBitmap
GetDeviceCaps
GetStockObject
GetTextExtentPoint32A
GetObjectA
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegEnumKeyA
shell32
DragAcceptFiles
SHGetPathFromIDListA
SHBrowseForFolderA
DragFinish
SHGetMalloc
ShellExecuteA
SHGetSpecialFolderLocation
SHGetDesktopFolder
DragQueryFileA
comctl32
ImageList_SetOverlayImage
ord17
ImageList_Destroy
ImageList_LoadImageA
shlwapi
PathFindFileNameA
PathAppendA
PathRemoveFileSpecA
PathFileExistsA
StrStrIA
PathIsDirectoryA
PathRenameExtensionA
PathFindExtensionA
PathIsRelativeA
PathStripToRootA
PathIsSameRootA
PathIsUNCA
oleaut32
VariantClear
VariantChangeType
VariantInit
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 156KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ