F:\VB6ComSample\growth\sure\hoping.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_67a1bfe8a351609c771846f2700907b0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_67a1bfe8a351609c771846f2700907b0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_67a1bfe8a351609c771846f2700907b0
-
Size
431KB
-
MD5
67a1bfe8a351609c771846f2700907b0
-
SHA1
1e510ed25fcb62bef64d0906020d2fdce6424202
-
SHA256
c20cbca39b70b1354f7d356d1c946bb163f5a351c33c045263fc986f2ceaeb9f
-
SHA512
b365e9ab23d41a115d5c20ba52a9a1d6389329cdedca17437c174d4aa028b5a4218e98d5ae4177e65b80152ca9e0d99a0c3d7dcf695aed9da872e3a69e716aaa
-
SSDEEP
12288:ma/2anFpagJtRoqt2oFDGcHGjeskqkjQo:ma/tnGQt2oFDG95kB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_67a1bfe8a351609c771846f2700907b0
Files
-
JaffaCakes118_67a1bfe8a351609c771846f2700907b0.exe windows:5 windows x86 arch:x86
2145b1262a7c8bbc8dbb1a061947c6ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_WDM_DRIVER
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
kernel32
GetCurrentThread
lstrcpyW
GetConsoleWindow
InterlockedDecrement
lstrcmpiA
Sleep
GetProcAddress
lstrcatA
HeapCreate
WaitForSingleObject
ExitProcess
FindResourceA
LoadResource
GetLastError
RaiseException
GetStartupInfoW
HeapSetInformation
CloseHandle
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetThreadPriority
LCMapStringW
HeapReAlloc
LoadLibraryW
MultiByteToWideChar
GetConsoleMode
GetConsoleCP
SetFilePointer
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
GetThreadPriority
lstrcpyA
SetPriorityClass
GetCurrentProcess
GetPriorityClass
GetModuleHandleA
GetStringTypeW
LoadLibraryA
FreeEnvironmentStringsW
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameW
GetStdHandle
WriteFile
GetCurrentThreadId
GetCommandLineA
HeapAlloc
RtlUnwind
LocalFree
DecodePointer
TerminateProcess
UnhandledExceptionFilter
SetLastError
GetModuleHandleW
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapFree
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
EncodePointer
user32
SendDlgItemMessageA
GetDlgItem
DeleteMenu
GetSystemMenu
GetWindowTextLengthA
SendMessageA
BeginDeferWindowPos
KillTimer
SetWindowTextA
wsprintfA
EnumDisplayMonitors
GetWindowLongA
GetWindowTextA
GetClassNameA
GetWindowContextHelpId
GetDlgCtrlID
WindowFromPoint
InvalidateRect
IsIconic
GetDC
ReleaseDC
CreateWindowExA
DestroyWindow
LoadMenuA
LoadBitmapA
GetClientRect
GetWindowRect
UnregisterClassA
DeferWindowPos
EndDeferWindowPos
GetDesktopWindow
GetWindow
SetActiveWindow
DefWindowProcA
GetParent
GetSysColorBrush
RegisterClassExA
SetLayeredWindowAttributes
EndDialog
gdi32
GetObjectA
CreateFontIndirectA
SetTextJustification
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyW
ole32
CoCreateInstance
CoUnmarshalInterface
OleIsCurrentClipboard
CoInitializeEx
CoGetInterfaceAndReleaseStream
OleInitialize
CoMarshalInterThreadInterfaceInStream
CoUninitialize
oleaut32
VariantClear
VariantInit
netapi32
NetUserEnum
winmm
mmioDescend
version
GetFileVersionInfoSizeA
shlwapi
StrRChrA
rasapi32
RasDialA
msi
ord40
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ