C:\xampp\htdocs\Loct\f85d95075ec54086b1e05c1320f8e250\Loader\pr2\Release\pr2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
CTM_50,000.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CTM_50,000.exe
Resource
win10v2004-20240412-en
General
-
Target
fec0dae7fa927dff718297148842fb7e_JaffaCakes118
-
Size
359KB
-
MD5
fec0dae7fa927dff718297148842fb7e
-
SHA1
d1bf0379d0aa3421b75392cb942d406bad29f82e
-
SHA256
3dba6300d34cd2fc6744ff6706c1f876d4fd42b3e3ed190dfab317ac3586b4d9
-
SHA512
04ff56f4f77e72092b963d21d2fbb3e41f6c4dcb53517a221145205c1e103fe2f6738d2f329861818656dfe3ad9f84650bbddb9cbf313fee58b3bf13b83a3bea
-
SSDEEP
6144:debp3wrnM7tQ3tDdV9z2K6m7BQRTd7UPlfdBzB8mFc1la33jcGbzcAVTMGN:d63wrztDdnz56mNQ95Upbz+GqG46xVD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack002/CTM_50,000.exe
Files
-
fec0dae7fa927dff718297148842fb7e_JaffaCakes118.eml
-
Proforma invoice.rar.rar
-
CTM_50,000.exe.exe windows:6 windows x86 arch:x86
7f3a4a0e96d9bcc5b3425ad3dca611da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteFile
CloseHandle
VirtualProtect
DecodePointer
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
GetProcessHeap
LCMapStringW
ReadFile
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
CreateFileW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RaiseException
RtlUnwind
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
WriteConsoleW
user32
LoadCursorW
GetWindowLongW
MessageBeep
MessageBoxW
GetWindowTextW
SetWindowTextW
EndPaint
BeginPaint
GetDC
UpdateWindow
GrayStringW
TranslateAcceleratorW
LoadAcceleratorsW
LoadIconW
GetDlgItem
EndDialog
DialogBoxParamW
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassExW
PostQuitMessage
DefWindowProcW
SendMessageW
DispatchMessageW
TranslateMessage
GetMessageW
LoadStringW
SendDlgItemMessageW
comdlg32
GetOpenFileNameW
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
email-html-1.txt