C:\Users\BEAUREGARD\Videos\PwdChange_src\PwdChange\Release\PwdChange.pdb
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_514d59e770f740493ba366654f9424761bfb89222d51005b2a0a0d66d0e929c7.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_514d59e770f740493ba366654f9424761bfb89222d51005b2a0a0d66d0e929c7
-
Size
361KB
-
MD5
58a21e1ef667b5ac2a505337617e3a03
-
SHA1
4a110b39618e8604cff144748d2efd6042b1c27d
-
SHA256
514d59e770f740493ba366654f9424761bfb89222d51005b2a0a0d66d0e929c7
-
SHA512
f1ec14782a83de98ccede157c921b8f8aed4b859daa9c30e7982047293dbd4ff940938ae0b51e23e26ea68a0bb8bf3eba9a7873f3177c558b6d2172316613636
-
SSDEEP
6144:R+A4ldJyCbC18+LmC3VNbR5jmoU+0AiG4tEeWntM63oqujq9yxVA/R:wyOC18+V3VNbR5jmh+0LEdMbVXxVi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_514d59e770f740493ba366654f9424761bfb89222d51005b2a0a0d66d0e929c7
Files
-
JaffaCakes118_514d59e770f740493ba366654f9424761bfb89222d51005b2a0a0d66d0e929c7.exe windows:5 windows x86 arch:x86
802db2b693e23b594e5f02f63ef92ced
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStartupInfoW
HeapAlloc
GetSystemTimeAsFileTime
HeapFree
RtlUnwind
RaiseException
HeapReAlloc
Sleep
ExitProcess
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
TerminateProcess
IsDebuggerPresent
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetErrorMode
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
CloseHandle
WritePrivateProfileStringW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
InterlockedExchange
lstrlenA
lstrcmpA
GetCurrentProcessId
GetModuleFileNameW
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
WideCharToMultiByte
lstrlenW
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryA
GetLastError
SetLastError
lstrcmpW
MultiByteToWideChar
GetModuleHandleW
GetVersionExA
FindResourceW
LoadResource
LockResource
SizeofResource
GetCurrentProcess
GetProcAddress
GetModuleHandleExA
LocalFree
FormatMessageW
FreeLibrary
LoadLibraryW
UnhandledExceptionFilter
user32
IsWindowEnabled
ShowWindow
SetWindowTextW
RegisterWindowMessageW
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
PostMessageW
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
GetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetSystemMetrics
IsIconic
LoadIconW
EnableWindow
SendMessageW
SetCursor
PtInRect
GetCursorPos
LoadCursorW
ReleaseDC
GetDC
GetParent
GetWindowRect
GetSysColor
IsWindow
UnregisterClassW
SetWindowLongW
GetClientRect
GetSysColorBrush
DestroyMenu
GetMessageW
TranslateMessage
ValidateRect
GetActiveWindow
PostQuitMessage
GetWindowThreadProcessId
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
gdi32
DeleteObject
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
DeleteDC
SetMapMode
RestoreDC
SaveDC
SetBkColor
GetDeviceCaps
ScaleWindowExtEx
GetStockObject
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegSetValueExW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
RegQueryValueW
shlwapi
PathFindFileNameW
PathFindExtensionW
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ