c:\stream\develop\Regionhunt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0e01542bdd676c53497d649d58eba864_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
0e01542bdd676c53497d649d58eba864_JaffaCakes118
-
Size
203KB
-
MD5
0e01542bdd676c53497d649d58eba864
-
SHA1
881d30e8438acf6ab1ddb9a4991472ee670e3092
-
SHA256
28f51fa6f903768c8b9a8e65c38b7da1ce3cfbb1d431824fb3b07435062497e9
-
SHA512
54df76e53740c4ee52013068adb831925fc7e7caf37db54ea9b39db708d9baa2a35dd2471ed6b32d8eeb00c6715f4cca1c6a9a892c476fd7f5f5628d35cd1b2f
-
SSDEEP
3072:9oji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9idp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 0e01542bdd676c53497d649d58eba864_JaffaCakes118
Files
-
0e01542bdd676c53497d649d58eba864_JaffaCakes118.exe windows:6 windows x86 arch:x86
ebc536e497c338b5abee5455de5bead2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
GetModuleHandleW
WideCharToMultiByte
LoadLibraryW
Sleep
GetModuleFileNameW
GetTempPathW
VirtualProtect
GetCurrentProcessId
EncodePointer
DecodePointer
GetCommandLineA
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
GetLastError
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
HeapSize
HeapFree
HeapAlloc
SetLastError
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
WriteFile
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EnterCriticalSection
LeaveCriticalSection
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
LCMapStringW
OutputDebugStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
Sections
.text Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ