D:\browsers.mail.ru_release\trunk\Internet\src\build\Release\chrome.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
75ab2118fd7c40f23dbf47fd4ae61c88_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75ab2118fd7c40f23dbf47fd4ae61c88_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
75ab2118fd7c40f23dbf47fd4ae61c88_JaffaCakes118
-
Size
756KB
-
MD5
75ab2118fd7c40f23dbf47fd4ae61c88
-
SHA1
0f4d9f421ce963c5f58c9baa3b3855637e98e34c
-
SHA256
63b5aad559b9ebd37ee1722a06c6eebd22b0af173f9191cd1c5445adcce9d1cd
-
SHA512
6eb43bb2bd9e084a976830d19b866ff0c17be92481876d58df4d3136da93aaf57e756da9953420225f74aaf1fc8081d0cdf5d6dbb55c594412a2b0071ea6732e
-
SSDEEP
12288:Rp8kU//0facRo93i6u0YqOXpuZb1AWtB/pymLeIJ7UHOwv9yHsjNYF8DuTXY8rZk:Rp89yOpymLepOwv9yHsjNAD/2hzwQGAP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75ab2118fd7c40f23dbf47fd4ae61c88_JaffaCakes118
Files
-
75ab2118fd7c40f23dbf47fd4ae61c88_JaffaCakes118.exe windows:5 windows x86 arch:x86
bc971e2f89f95fceab6436de8a65bfc4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathRemoveFileSpecW
PathFileExistsW
kernel32
GetTempPathW
GetLastError
CreateProcessW
CloseHandle
GetModuleHandleW
VirtualProtect
VirtualAllocEx
VirtualFreeEx
SetUnhandledExceptionFilter
GetCurrentProcess
DuplicateHandle
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
VirtualFree
SetFilePointer
ReadFile
GetSystemInfo
FreeLibrary
VirtualAlloc
CreateFileW
GetUserDefaultLangID
CreateMutexW
GetTickCount
WriteFile
SetLastError
ReleaseMutex
GetCurrentProcessId
CreateEventW
ExpandEnvironmentStringsW
InterlockedExchange
SetEnvironmentVariableW
lstrlenW
IsDebuggerPresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
GetNativeSystemInfo
GetVersionExW
SetInformationJobObject
SetHandleInformation
VirtualQueryEx
OpenProcess
AssignProcessToJobObject
GetStdHandle
GetProcessId
HeapSetInformation
ResumeThread
LocalAlloc
MapViewOfFile
TerminateProcess
GetCurrentDirectoryW
GetLongPathNameW
CreateFileMappingW
QueryDosDeviceW
GetLocaleInfoW
GetUserDefaultUILanguage
RaiseException
GetCurrentThreadId
CreateThread
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InterlockedExchangeAdd
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetEvent
ResetEvent
WaitForMultipleObjects
RtlCaptureStackBackTrace
LoadLibraryA
GetWindowsDirectoryW
SetEndOfFile
FlushFileBuffers
RegisterWaitForSingleObject
UnregisterWaitEx
GetModuleHandleExW
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
InterlockedIncrement
ReleaseSemaphore
InterlockedDecrement
RtlCaptureContext
CreateSemaphoreW
InitializeCriticalSection
GetThreadContext
SuspendThread
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
WriteProcessMemory
VirtualProtectEx
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
GetFileType
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
HeapReAlloc
GetFullPathNameW
HeapAlloc
GetProcessHeap
SetStdHandle
RtlUnwind
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetDriveTypeW
CompareStringW
InterlockedCompareExchange
Sleep
CreateRemoteThread
GetModuleHandleA
FormatMessageW
LocalFree
GetModuleFileNameW
GetEnvironmentVariableW
SetCurrentDirectoryW
LoadLibraryExW
GetEnvironmentVariableA
GetCommandLineW
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
GetFileAttributesW
GetSystemDirectoryW
user32
GetUserObjectInformationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
wsprintfW
MessageBoxW
CloseWindowStation
CharUpperW
userenv
GetProfileType
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
winmm
timeGetTime
advapi32
GetTraceEnableFlags
SetEntriesInAclW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
CreateProcessAsUserW
GetTraceLoggerHandle
TraceEvent
UnregisterTraceGuids
GetTraceEnableLevel
RegisterTraceGuidsW
RegDisablePredefinedCache
RevertToSelf
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
SetThreadToken
Exports
Exports
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine2
SetCrashKeyValuePair
SetExperimentList3
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
Sections
.text Size: 375KB - Virtual size: 375KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ