d:\Ascentive Projects\Consumer\SpywareStriker-Porting\7-Source New UI\SpywareStriker\Release\SpywareStriker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
56e9063ece512c2fc510ff78458cc8dc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56e9063ece512c2fc510ff78458cc8dc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
56e9063ece512c2fc510ff78458cc8dc_JaffaCakes118
-
Size
1.0MB
-
MD5
56e9063ece512c2fc510ff78458cc8dc
-
SHA1
f4e023ec2ff12d766125ed74714b82dbf9eabfd0
-
SHA256
62a9d685448c8e290557cbc3b88de042b287c162c39c0a7b8d5594a2c6fc28a2
-
SHA512
b2e1a7ab7fef397afdc34a6dcd7794bbfb438bf2f56ec454a73750597b174f5b8b19ddfaf2a7f3d3b85675af90eae7e0f5ce51d74d202d0f35abfe7fcfe3f713
-
SSDEEP
12288:EfOWpLoIxi6bk84L2AONG2+VFAZ7++rk8VA8AxaSwjZmw1BiEIFfbIWcInl:lQ+LoG2+VFAA4k8VPk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56e9063ece512c2fc510ff78458cc8dc_JaffaCakes118
Files
-
56e9063ece512c2fc510ff78458cc8dc_JaffaCakes118.exe windows:4 windows x86 arch:x86
73cc72744d55ce1cc522d882e9578b6f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
sqlite3
sqlite3_errmsg
sqlite3_finalize
sqlite3_step
sqlite3_column_text
sqlite3_column_count
sqlite3_free
sqlite3_mprintf
sqlite3_prepare
sqlite3_busy_timeout
sqlite3_close
sqlite3_open
wininet
InternetCanonicalizeUrlW
InternetGetCookieW
sbsdkxml
_GetNVScanResultsFactory@0
_GetThreatEngineSettingsFactory@0
spsdd
?CancelUpdates@CSPSDDWrapper@@QAEXXZ
??1CSPSDDWrapper@@QAE@XZ
?CreateDDDialog@CSPSDDWrapper@@QAE?AW4EDDReturnValue@@W4EStartLocation@@H@Z
??0CSPSDDWrapper@@QAE@XZ
mfc80u
ord1661
ord1662
ord2011
ord4884
ord4729
ord4206
ord5178
ord5485
ord1079
ord774
ord3674
ord760
ord572
ord754
ord416
ord651
ord2364
ord3877
ord2460
ord5398
ord5864
ord2872
ord2490
ord3793
ord2878
ord3985
ord2864
ord3322
ord4255
ord5210
ord1393
ord5911
ord6721
ord900
ord762
ord777
ord6700
ord282
ord1479
ord5558
ord4101
ord2261
ord1235
ord1022
ord776
ord4026
ord5829
ord3590
ord563
ord753
ord266
ord3678
ord1156
ord2361
ord265
ord3589
ord570
ord759
ord2366
ord6086
ord2240
ord3629
ord4563
ord4475
ord2832
ord5563
ord5209
ord5226
ord3942
ord5223
ord5220
ord2925
ord1911
ord899
ord556
ord744
ord380
ord5489
ord2696
ord3195
ord5091
ord2697
ord5342
ord1176
ord1178
ord1472
ord3990
ord2461
ord6014
ord5711
ord6282
ord1172
ord5316
ord6293
ord5327
ord3249
ord1476
ord557
ord745
ord384
ord629
ord5083
ord2897
ord5319
ord1430
ord5442
ord6002
ord896
ord2121
ord3204
ord3198
ord1271
ord1959
ord1925
ord3842
ord328
ord588
ord5998
ord5707
ord1220
ord4078
ord860
ord1058
ord1883
ord1386
ord1086
ord501
ord709
ord4743
ord6061
ord3756
ord2651
ord558
ord1906
ord1236
ord2155
ord3400
ord772
ord2444
ord5434
ord3848
ord290
ord330
ord589
ord4117
ord3995
ord3460
ord3642
ord395
ord635
ord2424
ord2421
ord2468
ord5161
ord4293
ord4109
ord2365
ord3296
ord4793
ord4162
ord4880
ord940
ord1182
ord4259
ord4271
ord1297
ord2164
ord5201
ord5144
ord3939
ord1548
ord4013
ord2418
ord2419
ord2986
ord5352
ord4898
ord2933
ord4129
ord4303
ord5006
ord5003
ord2609
ord1904
ord2237
ord5712
ord1908
ord1123
ord1139
ord4100
ord3189
ord620
ord2086
ord1582
ord4234
ord2985
ord3311
ord741
ord4074
ord2077
ord1536
ord4226
ord3158
ord587
ord591
ord1781
ord1772
ord1006
ord6232
ord3395
ord1403
ord2491
ord5524
ord1388
ord6262
ord1924
ord1475
ord4093
ord2082
ord1561
ord4231
ord3223
ord657
ord6161
ord6173
ord5414
ord1542
ord3547
ord721
ord519
ord718
ord528
ord3662
ord3064
ord4577
ord3157
ord5698
ord4266
ord1512
ord4274
ord5208
ord1573
ord2027
ord1318
ord3752
ord1626
ord1534
ord3151
ord583
ord4119
ord284
ord6279
ord3176
ord326
ord4882
ord1555
ord3155
ord6751
ord6749
ord6140
ord1946
ord1274
ord4347
ord4461
ord4463
ord3677
ord566
ord757
ord4094
ord2085
ord3238
ord3824
ord1117
ord1121
ord1049
ord5971
ord4025
ord547
ord956
ord334
ord593
ord5113
ord5118
ord5221
ord2239
ord1252
ord3331
ord3327
ord5562
ord4562
ord5222
ord3826
ord5378
ord6215
ord5096
ord1007
ord3800
ord5579
ord2009
ord2054
ord4320
ord6274
ord3795
ord6272
ord4008
ord4032
ord2260
ord277
ord3444
ord3639
ord368
ord616
ord4699
ord4258
ord4476
ord6039
ord5930
ord2762
ord3034
ord4216
ord1913
ord4733
ord4846
ord4251
ord5491
ord2736
ord5408
ord1370
ord5588
ord5152
ord2042
ord2007
ord6234
ord2615
ord2608
ord4560
ord3459
ord3641
ord393
ord6764
ord5170
ord4581
ord5984
ord6087
ord3079
ord5518
ord4292
ord977
ord4112
ord6276
ord4346
ord1416
ord4267
ord1547
ord1351
ord3338
ord2414
ord2413
ord2415
ord2412
ord2411
ord5200
ord5147
ord5910
ord6763
ord3968
ord4854
ord4857
ord4373
ord4378
ord4375
ord4393
ord4395
ord4380
ord4770
ord4172
ord4165
ord4974
ord4382
ord4775
ord4198
ord4784
ord4437
ord4438
ord3734
ord2362
ord6720
ord748
ord370
ord618
ord3670
ord6115
ord347
ord602
ord1270
ord2255
ord5723
ord6033
ord5638
ord1957
ord3946
ord6116
ord3318
ord4237
ord1585
ord1641
ord3545
ord715
ord5584
ord5633
ord3133
ord5519
ord1920
ord1572
ord1634
ord3467
ord642
ord5637
ord4230
ord1549
ord1628
ord658
ord3483
ord3645
ord2876
ord3396
ord2788
ord4755
ord2867
ord4558
ord3789
ord5981
ord1562
ord5053
ord1939
ord502
ord3224
ord2952
ord4232
ord2083
ord3581
ord2870
ord3344
ord503
ord3342
ord1299
ord2167
ord4945
ord5609
ord2066
ord4902
ord2254
ord3546
ord516
ord3661
ord4312
ord4388
ord4714
ord5207
ord4730
ord4207
ord4184
ord4838
ord4861
ord4611
ord4791
ord5064
ord5066
ord5065
ord6744
ord3570
ord3165
ord4228
ord1538
ord2080
ord4092
ord1474
ord1922
ord1960
ord2861
ord386
ord631
ord2271
ord2279
ord2742
ord1431
ord4344
ord2151
ord5747
ord5484
ord3869
ord3873
ord5867
ord5862
ord5869
ord5908
ord1611
ord1608
ord3940
ord1392
msvcr80
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_wstat64
_wrename
memset
_wunlink
_vscwprintf
_CxxThrowException
memmove_s
_vswprintf_p
__CxxFrameHandler3
calloc
_recalloc
_splitpath
wcstol
wcstoul
_swprintf
wcsncpy
_wcsdup
sscanf_s
swprintf_s
_initterm_e
_stricmp
_wtol
_mktime64
_wcsupr
_errno
strerror
?what@exception@std@@UBEPBDXZ
_invalid_parameter_noinfo
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
vswprintf_s
wcsstr
ceil
_wtoi
_localtime64_s
wcsftime
_time64
swscanf
atol
_itow
sprintf
atoi
free
malloc
_wcsicmp
wcscpy_s
wcscat_s
wcstombs
memcpy_s
__RTDynamicCast
floor
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
isdigit
memcpy
kernel32
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
ResumeThread
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapDestroy
HeapReAlloc
HeapSize
GetLastError
MulDiv
WideCharToMultiByte
lstrcpynW
OutputDebugStringW
GetEnvironmentVariableW
InterlockedDecrement
FindFirstFileW
FindNextFileW
FindClose
InterlockedIncrement
GlobalAlloc
GlobalLock
GlobalUnlock
GetVersionExW
CopyFileW
DeleteFileW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionNamesW
LoadLibraryA
GetProcAddress
DeleteCriticalSection
RaiseException
OpenEventW
CloseHandle
InitializeCriticalSection
CreateThread
GetCurrentProcess
GetCurrentProcessId
SetUnhandledExceptionFilter
GetUserDefaultLangID
FreeLibrary
HeapFree
GetProcessHeap
HeapAlloc
OpenProcess
FindResourceW
GetModuleHandleW
LoadResource
LockResource
SizeofResource
SetLastError
LoadLibraryW
CreateMutexW
GetCommandLineW
OpenMutexW
IsWow64Process
GlobalFree
FindResourceExW
CreateDirectoryW
GetWindowsDirectoryW
LocalFree
LocalAlloc
lstrlenW
FormatMessageW
GetDriveTypeW
GetTickCount
GetCurrentDirectoryW
SetCurrentDirectoryW
GetExitCodeProcess
TerminateProcess
Sleep
lstrlenA
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
WriteFile
GetFileSize
CreateFileW
QueryPerformanceCounter
GetLocalTime
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoW
GetCurrentThreadId
user32
GetWindowLongW
SetLayeredWindowAttributes
SetWindowPos
MessageBoxW
CopyImage
RegisterWindowMessageW
MapDialogRect
GetSysColor
GetMessagePos
ScreenToClient
SetRect
IsRectEmpty
OffsetRect
DrawFrameControl
DrawIconEx
DestroyIcon
GetTabbedTextExtentW
ReleaseDC
DestroyCursor
GetNextDlgTabItem
ClientToScreen
WindowFromPoint
DrawFocusRect
DrawStateW
SetWindowLongW
PostMessageW
CreateWindowExW
PeekMessageW
TranslateMessage
DispatchMessageW
SetMenuDefaultItem
GetGUIThreadInfo
GetActiveWindow
IsWindowVisible
PostQuitMessage
SetCursor
SetTimer
GetClientRect
GetDC
GetCursorPos
LoadCursorW
GetWindowRect
IsWindow
SendMessageW
LoadImageW
EnableWindow
EnableMenuItem
SetMenuItemBitmaps
AppendMenuW
GetIconInfo
CreatePopupMenu
SetActiveWindow
SetWindowRgn
RegisterHotKey
SetMenu
RemoveMenu
GetSystemMenu
GetLastActivePopup
KillTimer
SetForegroundWindow
UnregisterClassA
FindWindowW
GetFocus
GetMenuDefaultItem
BringWindowToTop
GetForegroundWindow
PtInRect
UpdateWindow
CopyRect
SystemParametersInfoW
GetWindow
GetTopWindow
GetClassNameW
FrameRect
GetDesktopWindow
EnableScrollBar
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
DrawIcon
GetParent
FillRect
InvalidateRect
InflateRect
GetDlgCtrlID
RedrawWindow
GetSystemMetrics
IsIconic
LoadIconW
CreateIconIndirect
gdi32
SetBkColor
BitBlt
DeleteDC
CreateFontW
SetPixel
CreateFontIndirectW
CreateRoundRectRgn
SelectObject
SetTextColor
CreateCompatibleBitmap
GetTextExtentPoint32W
GetPixel
DeleteObject
GetCurrentObject
CreateCompatibleDC
CreateBitmap
GetObjectW
StretchBlt
CreateSolidBrush
GetDeviceCaps
GetStockObject
advapi32
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
SHBindToParent
SHGetFolderPathW
Shell_NotifyIconW
ShellExecuteExW
SHGetDesktopFolder
ExtractIconExW
SHGetSpecialFolderPathW
ShellExecuteW
SHGetFileInfoW
SHGetSpecialFolderLocation
SHGetMalloc
comctl32
ImageList_Create
InitCommonControlsEx
_TrackMouseEvent
ImageList_Add
shlwapi
PathAppendW
PathIsDirectoryW
StrRetToStrW
PathFileExistsW
StrRetToBufW
ole32
CoCreateInstance
CLSIDFromProgID
CoUninitialize
CoInitializeEx
OleRun
CreateStreamOnHGlobal
CoTaskMemFree
CoInitialize
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
VariantChangeType
SystemTimeToVariantTime
VariantTimeToSystemTime
VarUdateFromDate
VarDateFromStr
OleLoadPicture
SysStringLen
GetErrorInfo
ws2_32
htons
connect
gethostbyname
WSAGetLastError
WSAStartup
WSACleanup
closesocket
recv
send
socket
msvcp80
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
winmm
PlaySoundW
Sections
.text Size: 484KB - Virtual size: 481KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 380KB - Virtual size: 377KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ