c:\73\93\72\15\Oh\back\74\56\Follow\Glass\1\summer\dealAnd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
77aae234f24bd59c1d4cdd50030d445a_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
77aae234f24bd59c1d4cdd50030d445a_JaffaCakes118
-
Size
352KB
-
MD5
77aae234f24bd59c1d4cdd50030d445a
-
SHA1
5d6d94e6cb5c51a15498a66f8d3289444875105f
-
SHA256
eb413325acbb2ea289969e834c5237fc6376073f24674b7760d45b94dfaf8755
-
SHA512
6e5f456cd92dd36c6f3e90b371679e64d9ddce9b6487644dfb97967eb2fa57e37c8a8707b6340f166281f03604424d789fbd8e6a7b307f865142c5bd2665474f
-
SSDEEP
6144:RBCrWeU2NQII2PZakuVcNuvGJz7Vnr5RDsxB:RBCCeU2NQIZaT2uezBnrbsxB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 77aae234f24bd59c1d4cdd50030d445a_JaffaCakes118
Files
-
77aae234f24bd59c1d4cdd50030d445a_JaffaCakes118.exe windows:6 windows x86 arch:x86
dc646f8242f2dca39cdd790f3cec379f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameA
VirtualProtect
CreatePipe
GetVolumeInformationA
LocalAlloc
GetLocaleInfoA
GetVersion
Sleep
GetTempPathA
GetSystemDirectoryA
GlobalAlloc
GlobalFree
GetSystemInfo
FileTimeToLocalFileTime
CreateEventA
GlobalUnlock
SetUnhandledExceptionFilter
CreateFileW
CloseHandle
DecodePointer
EncodePointer
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
WriteConsoleW
HeapQueryInformation
HeapSize
HeapReAlloc
HeapFree
GetProcessHeap
LCMapStringW
GetStringTypeW
GetFileType
SetStdHandle
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapValidate
OutputDebugStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
RaiseException
user32
FrameRect
ReleaseDC
RegisterClassExA
ScreenToClient
CallNextHookEx
GetClassInfoExA
ClientToScreen
GetWindowLongA
EnumWindows
DefWindowProcA
CreateWindowExA
SystemParametersInfoA
GetWindowTextLengthA
userenv
LeaveCriticalPolicySection
ExpandEnvironmentStringsForUserA
msimg32
AlphaBlend
TransparentBlt
GradientFill
tapi32
lineInitializeExA
lineAccept
lineTranslateDialogA
lineTranslateAddressA
lineClose
lineOpenA
lineNegotiateAPIVersion
Sections
.text Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ