d:\dbs\el\oc\target\x86\ship\click2run\x-none\perfboost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f55e635c0df4a76cc4e4f174121dfe86_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f55e635c0df4a76cc4e4f174121dfe86_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f55e635c0df4a76cc4e4f174121dfe86_JaffaCakes118
-
Size
1.5MB
-
MD5
f55e635c0df4a76cc4e4f174121dfe86
-
SHA1
5d582045d2e4facd6b374b76aa738c1c81cbbac2
-
SHA256
a1ef15eaafb78f831c1ad96aec5be90f02afdb610eb267136ed22699b763f7dd
-
SHA512
62e9189a78a6d1e12a4d5e3ba35dc0af0659bdde10f79ef5f3b26fe7a2a63bd11d7292865d1dba0c5c4bc3f7e117893332588356fa909be5d8b5c2c0e3dadcd0
-
SSDEEP
24576:Tx/B5ewYsKUnNzO0LdXewKNnpjvSI8LUlFl5Fp3/DrNDS5lS:NBQCKMN7pXRKNnp9cY/3rrNDS5lS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f55e635c0df4a76cc4e4f174121dfe86_JaffaCakes118
Files
-
f55e635c0df4a76cc4e4f174121dfe86_JaffaCakes118.exe windows:6 windows x86 arch:x86
4b540122e47bd952474dff889d5cdec9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
GetTokenInformation
OpenProcessToken
RegOpenKeyExW
RegCloseKey
IsValidSid
FreeSid
CreateWellKnownSid
EqualSid
RegGetValueW
EventWriteTransfer
EventRegister
EventUnregister
kernel32
HeapFree
CreateEventExW
GetCurrentProcess
GetModuleFileNameW
CreateMutexW
OpenEventW
Sleep
GetLastError
SetEvent
CloseHandle
GetCurrentProcessId
GetProcessHeap
QueryPerformanceFrequency
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCurrentThread
GetThreadTimes
FindNextFileW
FindClose
CreateFileW
GetModuleHandleA
GetProcAddress
SetFilePointerEx
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLCID
LCMapStringW
FreeLibrary
LocalFree
FormatMessageA
FindFirstFileExW
IsWow64Process
ReleaseSemaphore
GlobalFree
HeapAlloc
SetLastError
GetStringTypeW
GlobalMemoryStatusEx
RaiseException
LoadLibraryExW
GetModuleHandleW
GetVersionExW
InitializeCriticalSectionEx
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetTickCount64
TerminateProcess
GetModuleFileNameA
GetShortPathNameA
FindResourceW
SizeofResource
LoadResource
IsValidCodePage
FileTimeToSystemTime
FormatMessageW
GetLogicalProcessorInformation
WaitForSingleObjectEx
SignalObjectAndWait
GetProcessAffinityMask
CreateWaitableTimerW
GetCurrentThreadId
QueryDepthSList
TryEnterCriticalSection
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
GetFileType
WriteFile
FlsAlloc
TlsAlloc
FlsFree
TlsFree
FlsGetValue
TlsGetValue
FlsSetValue
TlsSetValue
GetModuleHandleExW
K32GetProcessMemoryInfo
LoadLibraryExA
VirtualQuery
GetSystemInfo
WriteConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
EnumSystemLocalesW
IsValidLocale
GetACP
DuplicateHandle
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
GetTickCount
GetLocaleInfoW
GetCPInfo
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
InterlockedFlushSList
CreateTimerQueue
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
FreeLibraryAndExitThread
VirtualAlloc
VirtualProtect
VirtualFree
UnregisterWaitEx
LoadLibraryW
HeapSize
HeapReAlloc
GetStdHandle
ExitProcess
ole32
StringFromGUID2
CoCreateGuid
Sections
.text Size: 329KB - Virtual size: 329KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c2r Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ