D:\GitLab-Runner\builds\9e6ca229\0\winapp\tcore\QuoteAdapter\TCoreGreeksPlugin\Release\TCoreGreeksPlugin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
08ea90af0bf430e2ee612bed5763c2eb_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
08ea90af0bf430e2ee612bed5763c2eb_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
08ea90af0bf430e2ee612bed5763c2eb_JaffaCakes118
-
Size
397KB
-
MD5
08ea90af0bf430e2ee612bed5763c2eb
-
SHA1
c44cfd4d2cda430a378f3b2e094932ec9a543dd4
-
SHA256
cf41e01d2c27180e1ea31c687d475fb0306554fe14375fe253c25f780186e8af
-
SHA512
66e63da1c2541b11253c2168fc1711543733fd746eb24f52e8447506b759f02e89619c50b63beac2c65aadf06d61f6d980dcae8674b2a3f7585662a4b5aea297
-
SSDEEP
12288:eGCmYGgormLtheA8nsCPmXsV/IGon7PtfyyTBvj9pGHNu4B2UU:eLmYGz/IGqPtfaI4rU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08ea90af0bf430e2ee612bed5763c2eb_JaffaCakes118
Files
-
08ea90af0bf430e2ee612bed5763c2eb_JaffaCakes118.exe windows:5 windows x86 arch:x86
27fbcfe1a731f7f53756a59436e5cbf2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dbghelp
MiniDumpWriteDump
psapi
GetProcessMemoryInfo
GetPerformanceInfo
mfc100u
ord13387
ord7108
ord13381
ord11477
ord11476
ord2164
ord4744
ord13854
ord11784
ord7548
ord7624
ord7524
ord11801
ord385
ord870
ord3752
ord5558
ord12610
ord2887
ord2884
ord7385
ord2418
ord14146
ord14148
ord14147
ord14145
ord14149
ord14132
ord14059
ord14060
ord8270
ord11081
ord3402
ord10937
ord13380
ord8112
ord11210
ord6247
ord10045
ord8393
ord2853
ord12724
ord11246
ord11244
ord1501
ord1508
ord1514
ord1512
ord1519
ord4388
ord4425
ord4396
ord4408
ord4404
ord4400
ord4430
ord4421
ord4392
ord4434
ord4413
ord4379
ord4383
ord4416
ord3999
ord14067
ord3992
ord8530
ord13382
ord7109
ord13388
ord6156
ord10725
ord12557
ord5276
ord2339
ord11116
ord3491
ord2952
ord2951
ord2852
ord11159
ord5143
ord5325
ord9333
ord5883
ord897
ord1905
ord1934
ord3261
ord6713
ord9525
ord423
ord981
ord4197
ord7241
ord788
ord1212
ord10081
ord3397
ord12951
ord8550
ord7973
ord2201
ord3507
ord481
ord1027
ord325
ord911
ord4274
ord2518
ord5235
ord3497
ord2533
ord7246
ord5830
ord8347
ord8372
ord11164
ord8277
ord2417
ord12606
ord5556
ord2756
ord2980
ord2981
ord10412
ord10058
ord8179
ord11123
ord11838
ord3684
ord3625
ord11864
ord7126
ord1739
ord14162
ord10976
ord13267
ord11469
ord7179
ord13570
ord13567
ord13572
ord13569
ord13571
ord13568
ord3416
ord5261
ord11228
ord11236
ord4086
ord7391
ord9498
ord11240
ord11209
ord11845
ord5118
ord4794
ord6140
ord950
ord5801
ord5862
ord3446
ord948
ord1014
ord1271
ord3627
ord11021
ord849
ord1895
ord7176
ord1292
ord890
ord6869
ord9447
ord3846
ord4642
ord4923
ord5115
ord8483
ord4901
ord4645
ord4623
ord6931
ord6932
ord6922
ord4792
ord7393
ord9328
ord8346
ord1870
ord2898
ord6674
ord6667
ord6704
ord5074
ord1871
ord3879
ord920
ord342
ord6323
ord7300
ord11503
ord745
ord11031
ord12153
ord1270
ord869
ord923
ord345
ord11683
ord7913
ord1987
ord1899
ord11531
ord5518
ord11618
ord2629
ord11619
ord7662
ord285
ord5264
ord1446
ord871
ord1272
ord5813
ord1020
ord469
ord4151
ord6036
ord2823
ord11330
ord2057
ord13396
ord1300
ord468
ord1019
ord1445
ord258
ord2062
ord11353
ord261
ord13415
ord4331
ord2614
ord11530
ord1174
ord721
ord2064
ord2068
ord1310
ord13168
ord7914
ord4290
ord296
ord1312
ord286
ord902
ord280
ord266
ord265
ord1298
ord2089
ord5889
ord5517
ord7661
ord2665
msvcr100
_mktime64
memcpy_s
_time64
memmove_s
_wtol
_finite
?what@exception@std@@UBEPBDXZ
swscanf
_wtoi64
wcstod
_wtoi
iswdigit
iswupper
??0exception@std@@QAE@ABV01@@Z
memmove
ldiv
??0exception@std@@QAE@ABQBD@Z
free
__CxxFrameHandler3
_CxxThrowException
memset
_localtime64_s
_wtof
_gmtime64_s
malloc
_CIexp
_CIsqrt
_CIpow
_CIatan
_CIlog
floor
memcpy
_amsg_exit
__wgetmainargs
_cexit
??1exception@std@@UAE@XZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
kernel32
GetLastError
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateEventW
SetEvent
CloseHandle
CreateThread
InterlockedDecrement
WaitForMultipleObjects
lstrlenA
MultiByteToWideChar
LocalFree
CreateMutexW
GetLocalTime
GetModuleFileNameW
GetModuleHandleW
CreateFileW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetPrivateProfileStringW
OpenProcess
TerminateProcess
CreateFileMappingW
MapViewOfFileEx
UnmapViewOfFile
InterlockedExchange
Sleep
InterlockedCompareExchange
HeapSetInformation
GetStartupInfoW
EncodePointer
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
DecodePointer
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
user32
PostMessageW
IsWindowVisible
KillTimer
DrawIcon
GetClientRect
GetSystemMetrics
EnableWindow
LoadIconW
SendMessageW
SetTimer
IsIconic
comctl32
InitCommonControlsEx
ole32
CoUninitialize
CoInitializeEx
CoInitialize
oleaut32
SysFreeString
SysStringLen
SysAllocString
VariantClear
SysAllocStringByteLen
msvcp100
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
Sections
.text Size: 223KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ