D:\Users\Stol\loader\Release\console_injector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ExtrimHack_0912/CSCFG.ru.url
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ExtrimHack_0912/CSCFG.ru.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
ExtrimHack_0912/extrimhack.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
ExtrimHack_0912/extrimhack.exe
Resource
win10v2004-20240508-en
General
-
Target
07b907c86f3085c87930c62d39310003_JaffaCakes118
-
Size
811KB
-
MD5
07b907c86f3085c87930c62d39310003
-
SHA1
3b6f8708390020eba96ec6b88f6825d9d0360455
-
SHA256
e434a4e5736a5ba6b832e55047973ba97d7b49f2bf9c18c34b11970ec1f46d15
-
SHA512
7ab91ee31456dbea1f1d113e79e9199a786ac33e1278965521a7f52acba9d3602273bd2dd4a44aa0269733567e430f2e82050c1ad2948ffcd227591b21aed0f8
-
SSDEEP
24576:OMOdx9SDiFWxtxVYQP3+rgZlCn/y+SbK9:JOduD1YQP3+cZlh+Su9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ExtrimHack_0912/extrimhack.exe
Files
-
07b907c86f3085c87930c62d39310003_JaffaCakes118.rar
-
ExtrimHack_0912/CSCFG.ru.url.url
-
ExtrimHack_0912/extrimhack.exe.exe windows:6 windows x86 arch:x86
962bdefea2ebd24f0962091674e147d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Process32First
SetLastError
SetConsoleTitleA
WaitForSingleObject
GetModuleHandleA
CreateToolhelp32Snapshot
GetExitCodeThread
Sleep
LoadLibraryA
Process32Next
CloseHandle
LoadLibraryW
GetProcAddress
VirtualAllocEx
ExitProcess
CreateRemoteThread
lstrcmpiA
CreateFileW
HeapSize
ReadConsoleW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
WideCharToMultiByte
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
GetLastError
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapFree
HeapReAlloc
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
GetProcessHeap
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
WriteConsoleW
shell32
ShellExecuteA
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 772B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
ExtrimHack_0912/Прочитай!.txt