e:\MyWork\Nbms_bar\trunk\BarClient\GameOptimize\Release\GameOptimize.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6d6aa8057e3b81cebeb127446cd011f0.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_6d6aa8057e3b81cebeb127446cd011f0
-
Size
216KB
-
MD5
6d6aa8057e3b81cebeb127446cd011f0
-
SHA1
7cf4cab7454827e39898c57dece2dfe13fa60de5
-
SHA256
197b9c863aa28fdafc1168907c5e363a9dfbecad322c13ec149e0a5fb98a90ef
-
SHA512
49b8ca24c8e9d1fdcc4cb11c0977b555f5db9b9a2e8286d9b170b485a90692a7e3e29c9b244f049408216e0767cea2ebc19f464be9109025dd1560b6e6141a05
-
SSDEEP
3072:ol3qOf+5or1QcMgmST9F+bAsOekqMhOdFAeRV8HDO4O2Vurl3dQuGCH:dOf+5UpMdkF+8sOKmw+eR8kFdo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_6d6aa8057e3b81cebeb127446cd011f0
Files
-
JaffaCakes118_6d6aa8057e3b81cebeb127446cd011f0.exe windows:4 windows x86 arch:x86
a51c8776c70e100a8b66fa65371f3081
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcmpW
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GlobalFlags
GetCPInfo
GetOEMCP
ExitProcess
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
TerminateProcess
HeapSize
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetTickCount
TlsFree
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetUnhandledExceptionFilter
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
InterlockedDecrement
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
ConvertDefaultLocale
EnumResourceLanguagesA
SetErrorMode
lstrcatA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
lstrcmpA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateDirectoryA
GetModuleFileNameA
LocalFree
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
LoadLibraryA
GetProcAddress
GetCommandLineA
GetModuleHandleA
CloseHandle
GetCurrentDirectoryA
CopyFileA
SetFileAttributesA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetCurrentProcessId
InterlockedExchange
user32
SetWindowTextA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
GetForegroundWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
ShowWindow
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
GetClientRect
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
GetWindowTextA
GetMessageTime
SendMessageA
MessageBoxA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
PostMessageA
PostQuitMessage
wsprintfA
GetSystemMetrics
UnregisterClassA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CharUpperA
GetMenu
gdi32
GetStockObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetDeviceCaps
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
SelectObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
comctl32
ord17
shlwapi
PathFileExistsA
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
oleaut32
VariantInit
VariantChangeType
VariantClear
dbghelp
MakeSureDirectoryPathExists
Sections
.text Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�>%�u` Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE