d:\Source\YYGames\release\YYGames.pdb
Static task
static1
Behavioral task
behavioral1
Sample
56138674bcd06c764c1eedae78b7992f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
56138674bcd06c764c1eedae78b7992f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
56138674bcd06c764c1eedae78b7992f_JaffaCakes118
-
Size
204KB
-
MD5
56138674bcd06c764c1eedae78b7992f
-
SHA1
f868f713d9eb1e0540fb6f3fadd79833a59bdcd6
-
SHA256
65cedcc80588aceea248fb92a33817fcb4a8665cfa615612e925a73e81876996
-
SHA512
db5f1694084bf422c0014b717caef8d00db6df40c49810b05f814a554d14cceeac802a2d69d4c8c640c8f16a5de36f270a5147253815789e8d4f4daa6675e203
-
SSDEEP
6144:RL3izI6ARw6kpU4MAd3dQcPi+I7F1uJicjv/MUH:RDizI6pjeuMcDV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56138674bcd06c764c1eedae78b7992f_JaffaCakes118
Files
-
56138674bcd06c764c1eedae78b7992f_JaffaCakes118.exe windows:5 windows x86 arch:x86
05aac28a54f01f0d252b256004ee9d7d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateThread
GetFileSize
FreeResource
FindResourceW
LoadResource
HeapFree
WriteFile
SizeofResource
ReadFile
CreateFileW
GetLastError
GetCurrentDirectoryW
Process32FirstW
LockResource
DeviceIoControl
Process32NextW
lstrcmpiW
lstrcatW
CreateToolhelp32Snapshot
CloseHandle
ResumeThread
GetCurrentProcessId
TerminateThread
Sleep
CreateFileA
lstrlenA
GetPrivateProfileIntA
WideCharToMultiByte
FlushFileBuffers
GetLocaleInfoA
SuspendThread
lstrlenW
FormatMessageW
GetProcessHeap
GetTickCount
InterlockedDecrement
DeleteFileW
HeapAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
LoadLibraryA
MultiByteToWideChar
GetStartupInfoW
RtlUnwind
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
user32
MessageBoxW
wsprintfW
EndDialog
DialogBoxParamW
SendDlgItemMessageW
EnableWindow
wsprintfA
GetWindowTextW
GetDlgItem
advapi32
StartServiceW
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
ControlService
shell32
ShellExecuteW
ole32
CoCreateInstance
CLSIDFromString
CoInitialize
OleRun
CoUninitialize
CLSIDFromProgID
oleaut32
SysFreeString
VariantClear
SysAllocString
GetErrorInfo
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.v-lizer Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE