d:\开发\QDownUpdate\RayUpdate\Release\QDown.pdb
Static task
static1
Behavioral task
behavioral1
Sample
213cebbcb35767f04f7e0de88c61b036_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
213cebbcb35767f04f7e0de88c61b036_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
213cebbcb35767f04f7e0de88c61b036_JaffaCakes118
-
Size
252KB
-
MD5
213cebbcb35767f04f7e0de88c61b036
-
SHA1
8fa3b52cf08cd03061072519236d66a79fc10e3d
-
SHA256
ca1e1a96c5b54bac3e937037b7f1d922ac19f9351440ddef4499171681caee74
-
SHA512
bfad0cc42e0bfc9248049075c06a912ccc87c39b1a0ac472c6bb5e292c6ff8d5094fbb2c698ac53fcb5562242ccb5715c90b68408573b36c8581557b5813ce92
-
SSDEEP
3072:ZfWtCR7Kd9odAUuOGrVCeCYKzlTKZ4MMGvMM0kdZqmWN2hqTDp570C2Er9f:V4A2GgOGUYKcZz0m5WNpN12Er
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 213cebbcb35767f04f7e0de88c61b036_JaffaCakes118
Files
-
213cebbcb35767f04f7e0de88c61b036_JaffaCakes118.exe windows:4 windows x86 arch:x86
3eb9a2fc5811969ce2487885c93d195a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc71
ord2933
ord6118
ord1482
ord1063
ord5182
ord4212
ord4735
ord4890
ord1671
ord1670
ord1551
ord5912
ord1620
ord1617
ord3946
ord1401
ord4244
ord5152
ord1908
ord5073
ord6275
ord4185
ord5203
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord299
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2862
ord4486
ord4262
ord3182
ord354
ord304
ord911
ord2468
ord1123
ord781
ord762
ord784
ord5403
ord4109
ord865
ord305
ord907
ord2131
ord2902
ord1489
ord297
ord501
ord709
ord4749
ord4580
ord310
ord4035
ord3934
ord265
ord266
ord578
ord1903
ord876
ord2372
ord2371
ord1084
ord3641
ord3830
ord1054
ord5975
ord2020
ord764
ord2248
ord605
ord757
ord566
ord3333
ord4261
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord1207
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord3683
ord2387
ord4541
msvcr71
_setmbcp
_getch
_wcsicmp
_mbsrchr
__CxxFrameHandler
_except_handler3
wcscpy
strncpy
_vsnprintf
wcslen
wcsncpy
wcscat
_vsnwprintf
wcsrchr
free
atoi
_CxxThrowException
swprintf
printf
setlocale
mbstowcs
vprintf
wprintf
vwprintf
strncmp
sprintf
_read
_write
_close
_lseek
_wopen
_errno
_wremove
_mbschr
_mbsnbcpy
_mbsstr
_mbsnbicmp
_mbclen
wctomb
strtol
mbtowc
strerror
memmove
fclose
fread
ftell
fseek
fopen
fwrite
memset
__dllonexit
_onexit
__security_error_handler
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
_controlfp
__set_app_type
__p__fmode
_mbsnbcmp
kernel32
Sleep
MultiByteToWideChar
WideCharToMultiByte
GetLastError
GetFileAttributesW
DeleteFileW
FreeLibrary
SetFileAttributesW
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileW
OpenProcess
GetStdHandle
CreateDirectoryW
FormatMessageW
GetProcAddress
GetModuleHandleW
GetTempPathW
LoadLibraryW
ReadFile
SetFilePointer
GetCurrentDirectoryW
GetWindowsDirectoryW
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
DeleteFileA
GetModuleFileNameA
GetVersionExA
OpenMutexA
SetConsoleTextAttribute
CloseHandle
CreateMutexA
user32
GetWindowThreadProcessId
LoadIconA
GetSystemMetrics
FindWindowA
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
EnableWindow
shell32
ShellExecuteA
comctl32
ord17
msvcp71
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEX_NI@Z
?reserve@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXI@Z
??0?$_String_val@DV?$allocator@D@std@@@std@@IAE@V?$allocator@D@1@@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@Viterator@12@0ABV12@@Z
?end@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AViterator@12@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ