D:\DevNetluxReturns\NetLux\NxVirusRemovalTool\Release\nxvrt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7c4ed2bc49005c3269e7cf34132c11b6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c4ed2bc49005c3269e7cf34132c11b6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7c4ed2bc49005c3269e7cf34132c11b6_JaffaCakes118
-
Size
2.7MB
-
MD5
7c4ed2bc49005c3269e7cf34132c11b6
-
SHA1
19c8d0e883985bc4e14fa740190ec2d333611faf
-
SHA256
01c8088c0167935fe4aaa4ae23eb2608903a4b6fe1dc4084d383b0baccf223aa
-
SHA512
0a8386ca3a93cce1ab3d5e2c73aa7f72a6c9a7cb4ecad5870afbb31db98bc763fd144477d056acdc78a3ae7fad12538ce9bae09537708537949e2d5af3317625
-
SSDEEP
49152:zLpJcs69tTxibQ7QkZqfeREP5jUm4pDg3delQ8//F2EkKjCOHCqFW5:zx6AbEQkZ/REP5jUm4pDEdelQ8//F2ES
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7c4ed2bc49005c3269e7cf34132c11b6_JaffaCakes118
Files
-
7c4ed2bc49005c3269e7cf34132c11b6_JaffaCakes118.exe windows:5 windows x86 arch:x86
bc653c85b0d76d085c72c2f7d6a68f49
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeleteCriticalSection
TlsFree
GlobalFlags
FlushFileBuffers
LockFile
UnlockFile
GetVolumeInformationW
GetFullPathNameW
SetErrorMode
FileTimeToLocalFileTime
GetFileSizeEx
GetFileTime
GetStartupInfoW
HeapFree
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
RaiseException
ExitProcess
ExitThread
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
LocalReAlloc
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
InterlockedIncrement
FileTimeToSystemTime
GetThreadLocale
lstrlenA
InterlockedDecrement
GlobalFindAtomW
GetVersionExW
CompareStringW
GetVersionExA
GlobalAddAtomW
SuspendThread
ResumeThread
SetThreadPriority
FreeResource
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
MulDiv
WideCharToMultiByte
GetTickCount
LoadLibraryA
CreateThread
LocalFree
LocalAlloc
DuplicateHandle
GetCurrentProcessId
GetExitCodeThread
GetModuleHandleA
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
Module32NextW
Module32FirstW
CreateRemoteThread
Sleep
TerminateProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
GetCurrentProcess
VirtualQuery
MapViewOfFile
CreateFileMappingW
GetFileSize
GetBinaryTypeW
ReadFile
MultiByteToWideChar
CopyFileW
ResetEvent
SetEvent
CreateEventW
GetModuleFileNameW
TerminateThread
GetModuleHandleW
RemoveDirectoryW
MoveFileExW
DeleteFileW
SetFileAttributesW
HeapAlloc
GetPrivateProfileStringW
WritePrivateProfileStringW
UnmapViewOfFile
LoadLibraryW
FindResourceW
LoadResource
SizeofResource
LockResource
SetEndOfFile
lstrlenW
CreateDirectoryW
OutputDebugStringW
GetLogicalDriveStringsW
FindClose
FindNextFileW
FindFirstFileW
WriteFile
SetFilePointer
FreeLibrary
WaitForSingleObject
GetProcAddress
GetLastError
GetFileAttributesW
CreateFileW
GetFileType
CloseHandle
user32
CharUpperW
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
CopyAcceleratorTableW
CharNextW
LoadCursorW
GetSysColorBrush
WindowFromPoint
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
EqualRect
DefWindowProcW
CallWindowProcW
GetMenu
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindowThreadProcessId
GetLastActivePopup
SetWindowsHookExW
CallNextHookEx
GetMessageW
DispatchMessageW
IsWindowVisible
GetKeyState
PeekMessageW
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
ReleaseDC
GetDC
CopyRect
GetWindowTextLengthW
GetWindowTextW
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowLongW
GetDlgCtrlID
GetWindowLongW
PostThreadMessageW
RegisterClipboardFormatW
IsDialogMessageW
UnregisterClassW
DestroyMenu
SendDlgItemMessageW
GetDlgItem
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetCursor
UpdateWindow
InvalidateRect
PostMessageW
IsRectEmpty
SetWindowTextW
GetFocus
GetCursorPos
InflateRect
ReleaseCapture
GetCapture
SetCapture
PtInRect
GetParent
KillTimer
OffsetRect
GetSysColor
SetTimer
RedrawWindow
IsWindow
GetWindowRect
GetClientRect
SendMessageW
LoadIconW
EnableWindow
MessageBoxW
TranslateMessage
gdi32
ExtSelectClipRgn
DeleteDC
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetStockObject
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateRectRgnIndirect
GetDeviceCaps
DeleteObject
CreateFontIndirectW
CreateSolidBrush
CreateCompatibleBitmap
CreateCompatibleDC
GetTextExtentPoint32W
CreatePen
BitBlt
SetPixel
GetCurrentObject
GetObjectW
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
RegOpenKeyExW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryValueExW
RegCloseKey
SetFileSecurityW
OpenProcessToken
shell32
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
comctl32
_TrackMouseEvent
InitCommonControlsEx
shlwapi
StrStrIW
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathStripToRootW
PathFileExistsW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CLSIDFromString
CLSIDFromProgID
OleFlushClipboard
CoGetClassObject
CoTaskMemFree
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CoTaskMemAlloc
OleIsCurrentClipboard
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantInit
VariantChangeType
SysStringLen
SysFreeString
SysAllocStringLen
VariantClear
gdiplus
GdipDeletePen
GdipCreatePen1
GdipDeleteGraphics
GdipCreateFromHDC
GdiplusShutdown
GdiplusStartup
GdipDrawLineI
fltlib
FilterConnectCommunicationPort
psapi
EnumProcesses
GetModuleFileNameExW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ