C:\Users\PRINCE PREM KUMAR\Downloads\Telegram Desktop\New folder (2)\SysTrayDemo (3)\Release\SysTrayDemo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f7111740c7e617e3abd069ebf18e815d_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f7111740c7e617e3abd069ebf18e815d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f7111740c7e617e3abd069ebf18e815d_JaffaCakes118
-
Size
4.7MB
-
MD5
f7111740c7e617e3abd069ebf18e815d
-
SHA1
35095c9e868b1364063873156839b810e854b4fc
-
SHA256
672c58d8a5ac859b088401547e7e79f115b0341cf8c5a053454359f0af5581f0
-
SHA512
f6e1a24640f1e45cd19d23b7b52a582ed4484c49524e43dff31a19bcbba616c7e16af989ed283ae4cbdc5cd802cb29bb8fffcf24b7737816a549f5cb696c4be8
-
SSDEEP
49152:084P690mfNjDz5dT6xpCoJUGpDeCRyTH8zgiWFNBiPilPyGo97uTfJPilPyGo97E:SP6NjDixc2UGpLzgUPilPgYPilPg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f7111740c7e617e3abd069ebf18e815d_JaffaCakes118
Files
-
f7111740c7e617e3abd069ebf18e815d_JaffaCakes118.exe windows:6 windows x86 arch:x86
7fe5681e7c5e4b1bfbfb512f9f5e8332
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
normaliz
IdnToAscii
ws2_32
send
recv
closesocket
ntohl
gethostname
sendto
recvfrom
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSAGetLastError
wldap32
ord217
ord46
ord301
ord143
ord27
ord30
ord79
ord35
ord33
ord32
ord200
ord26
ord22
ord41
ord50
ord45
ord60
ord211
crypt32
CertAddCertificateContextToStore
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
advapi32
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CopySid
IsValidSid
OpenProcessToken
ConvertSidToStringSidW
GetLengthSid
GetTokenInformation
CreateServiceA
CloseServiceHandle
OpenSCManagerA
DeleteService
ChangeServiceConfigA
ControlService
StartServiceA
OpenServiceA
kernel32
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
DuplicateHandle
InterlockedPushEntrySList
RtlUnwind
OutputDebugStringW
GetCurrentProcessId
GetStartupInfoW
CreateProcessW
ExitProcess
GetModuleHandleExW
GetSystemInfo
VirtualProtect
VirtualQuery
CreateThread
ExitThread
GetConsoleMode
FreeLibraryAndExitThread
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameW
ReadConsoleW
GetConsoleOutputCP
FlushFileBuffers
WaitForSingleObject
GetExitCodeProcess
CreatePipe
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
SetStdHandle
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
DeleteFileW
AreFileApisANSI
WriteConsoleW
SizeofResource
VirtualFree
WriteFile
VirtualAlloc
GetCurrentDirectoryA
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Sleep
GetLastError
Process32NextW
CreateFileA
LockResource
DeleteFileA
Process32FirstW
CloseHandle
LoadResource
FindResourceW
VirtualProtectEx
GetProcAddress
ReadProcessMemory
AllocConsole
WriteProcessMemory
VirtualQueryEx
GetModuleFileNameA
HeapFree
GetCurrentProcess
InitializeCriticalSectionEx
HeapSize
HeapReAlloc
RaiseException
HeapAlloc
DecodePointer
HeapDestroy
GlobalLock
LocalFree
DeleteCriticalSection
GetProcessHeap
WideCharToMultiByte
GlobalUnlock
SetLastError
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
SleepEx
QueryPerformanceFrequency
GetSystemDirectoryA
FreeLibrary
LoadLibraryA
QueryPerformanceCounter
GetTickCount
MultiByteToWideChar
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
VerSetConditionMask
VerifyVersionInfoA
GetFileSizeEx
GetEnvironmentVariableW
GetModuleHandleW
IsDebuggerPresent
InitializeSListHead
CreateEventW
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
GetSystemTimeAsFileTime
GetCPInfo
CompareStringEx
LCMapStringEx
EncodePointer
GetCurrentThreadId
FormatMessageA
GetCurrentDirectoryW
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
user32
GetCursorPos
SetForegroundWindow
ShowWindow
PostQuitMessage
InsertMenuW
LoadCursorW
LoadIconW
TranslateMessage
TranslateAcceleratorW
CloseClipboard
DispatchMessageW
OpenClipboard
MessageBoxW
MessageBoxA
FindWindowA
DialogBoxParamW
LoadStringW
GetMessageW
DefWindowProcW
DestroyWindow
CreateWindowExW
EndDialog
CreatePopupMenu
RegisterClassExW
LoadAcceleratorsW
TrackPopupMenu
GetClipboardData
shell32
Shell_NotifyIconW
ShellExecuteA
winhttp
WinHttpCloseHandle
WinHttpSetOption
WinHttpOpenRequest
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpConnect
userenv
UnloadUserProfile
rpcrt4
UuidToStringA
RpcStringFreeA
UuidCreate
psapi
GetProcessMemoryInfo
Sections
.text Size: 818KB - Virtual size: 818KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ