Static task
static1
Behavioral task
behavioral1
Sample
Irony Of Nightmare Free Download PC Game.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Irony Of Nightmare Free Download PC Game.exe
Resource
win10v2004-20240508-en
General
-
Target
b3c065f4350163947fe07b6fa520c596_JaffaCakes118
-
Size
1.2MB
-
MD5
b3c065f4350163947fe07b6fa520c596
-
SHA1
d0b578a452846d278a8107dbb57269935c7c367c
-
SHA256
cc611933b8a697b804fb16902b41acee5fc7323b967383dffe645722f2ef651d
-
SHA512
75a798bc49dbe451d1cbc764ec9461c06b50107b878e13434f6bec247f5d9f2a7180a96721d7b952a4174bdc725e5899a3a65e705aeab5235c2356f7791b1002
-
SSDEEP
12288:bOcMtmO+pUKjGrafh0Lk0227Z3ZLxL8Qx1yP+LUzfM14pKiY:6lv+eKjGea2mZ7L8Q2P+AzU14pK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/Irony Of Nightmare Free Download PC Game.exe
Files
-
b3c065f4350163947fe07b6fa520c596_JaffaCakes118.iso
-
out.iso.iso
-
Irony Of Nightmare Free Download PC Game.exe.exe windows:5 windows x86 arch:x86
2ef3f055f413df8601e3ed73dd6f7e9e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetCurrentThreadId
CloseHandle
UnmapViewOfFile
SwitchToThread
GetProcAddress
GetModuleHandleA
GetTickCount
LocalFree
GetSystemInfo
FormatMessageA
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
EncodePointer
InterlockedPushEntrySList
RaiseException
GetLastError
SetLastError
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetACP
HeapFree
HeapAlloc
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
GetFileAttributesExW
CompareStringW
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
GetFileType
SetStdHandle
GetStringTypeW
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
CreateFileW
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Sections
.text Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 637KB - Virtual size: 636KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ