c:\Documents and Settings\Slava\Desktop\BhoKeeper\Release\BhoKeeper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
02e4bc7e399a894a4bc9c943c4493253_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
02e4bc7e399a894a4bc9c943c4493253_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
02e4bc7e399a894a4bc9c943c4493253_JaffaCakes118
-
Size
10KB
-
MD5
02e4bc7e399a894a4bc9c943c4493253
-
SHA1
7ced7582cf67c6fea74b621ba9cd0054cd5011ef
-
SHA256
9edaa93ed5dbf17441df45535a37d36e951df1bcdc48381ebe62d35a18bedfd0
-
SHA512
c68a38046f5d4dd608d0c971f13d80cbae7989339226cd266c53899f9650cc483499bc323426625a640d322cb1c079c24539b0ca992c0ba44d29ec17ee6203be
-
SSDEEP
192:BCGZuvJLjffRiwqOIc62zyBXiM/DyBsQfi4S0x+QH9MR6vkqCtWfm:BHZGf8sIkOt8aQflSCH9W6nu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02e4bc7e399a894a4bc9c943c4493253_JaffaCakes118
Files
-
02e4bc7e399a894a4bc9c943c4493253_JaffaCakes118.exe windows:4 windows x86 arch:x86
7a738b3937469a18016ce4b58efe4414
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
OpenProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
TerminateProcess
GetProcAddress
LoadLibraryA
GetModuleFileNameA
IsDebuggerPresent
DeleteFileA
user32
LoadStringA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadCursorA
RegisterClassExA
FindWindowA
KillTimer
DefWindowProcA
DestroyWindow
BeginPaint
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
SetTimer
RegisterHotKey
GetWindowThreadProcessId
advapi32
RegQueryValueExA
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetSpecialFolderPathA
msvcr80
__dllonexit
_unlock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_lock
_crt_debugger_hook
__set_app_type
strrchr
strstr
fclose
atoi
strcpy
fgets
feof
fopen
strcat
strncpy
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
_strlwr
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 568B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ