c:\DailyBuild\sources\Nero7\Aptk\Src\NeroPatentActivation\Unicode Release X86\NeroPatentActivation.pdb
Static task
static1
Behavioral task
behavioral1
Sample
29c70c20f32bba11a53c463e75679418_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29c70c20f32bba11a53c463e75679418_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29c70c20f32bba11a53c463e75679418_JaffaCakes118
-
Size
152KB
-
MD5
29c70c20f32bba11a53c463e75679418
-
SHA1
53bb74af32355fbb5e971c4f03b4c93239d069d6
-
SHA256
3e43ce4a1c73129222047be9f95de49e026b5f6ccb43d47331cc898fac7ca3f9
-
SHA512
6661993cf49657f5fbd2c2829824f6eb7a2baac43a4295e9b2dd53a640110d7f71662f30e6353dfbb74511f4e4399545fd3d641e356d741d858b495cf7e6b971
-
SSDEEP
3072:gpbKReZ6C6TJPuJVSEmNcRm1xwkbJYRXNyY2FUmPcpX7Ssk:i6TBuJV6c0DwkKZ2Fsjk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29c70c20f32bba11a53c463e75679418_JaffaCakes118
Files
-
29c70c20f32bba11a53c463e75679418_JaffaCakes118.exe windows:4 windows x86 arch:x86
a60065a732f27b4cb6bb65654dec2df5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc71u
ord2531
ord2725
ord2829
ord4301
ord2708
ord2832
ord2534
ord2640
ord2527
ord3712
ord3713
ord3703
ord2638
ord3943
ord4475
ord4255
ord3327
ord548
ord442
ord566
ord5113
ord4038
ord1121
ord3824
ord3678
ord5911
ord1611
ord1608
ord3940
ord1393
ord4238
ord5148
ord1899
ord5067
ord4179
ord5210
ord3397
ord4716
ord4276
ord1591
ord5956
ord5231
ord5229
ord920
ord925
ord929
ord927
ord931
ord2384
ord2404
ord2388
ord2394
ord2392
ord2390
ord2407
ord5562
ord2386
ord2409
ord2397
ord2379
ord2381
ord2399
ord2169
ord2163
ord1513
ord6273
ord3796
ord6275
ord3339
ord4961
ord1353
ord5171
ord1955
ord1647
ord1646
ord1590
ord5196
ord2856
ord4480
ord1079
ord1086
ord1894
ord6271
ord3331
ord760
ord1156
ord572
ord266
ord265
ord3590
ord1176
ord4094
ord2085
ord3238
ord1946
ord2365
ord1274
ord1058
ord4902
ord5327
ord6293
ord5316
ord6282
ord5209
ord5226
ord4562
ord3942
ord5222
ord5220
ord2925
ord1911
ord3826
ord5378
ord6215
ord5096
ord1007
ord3800
ord5579
ord2009
ord2054
ord4320
ord6274
ord3795
ord6272
ord4008
ord4032
ord675
ord757
ord2239
ord6201
ord762
ord764
ord1178
ord1182
ord283
ord2261
ord5485
ord774
ord870
ord577
ord593
ord334
ord293
ord3249
ord5119
ord2402
ord1198
ord3677
msvcr71
??0exception@@QAE@XZ
_purecall
??0exception@@QAE@ABV0@@Z
_CxxThrowException
??1exception@@UAE@XZ
__CxxFrameHandler
_wtoi
wcsncpy
_stricmp
_localtime64
ceil
_time64
memset
_except_handler3
free
strcmp
_strupr
strncpy
_c_exit
_exit
_XcptFilter
_cexit
exit
_wcmdln
_amsg_exit
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_controlfp
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_onexit
__security_error_handler
kernel32
GetLocaleInfoW
GetVersion
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleA
GetStartupInfoW
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentVariableW
GetVersionExW
GetThreadLocale
GetLocaleInfoA
InterlockedExchange
GetVersionExA
GetACP
user32
RegisterWindowMessageW
GetCursorPos
TrackPopupMenu
SetMenuDefaultItem
SetForegroundWindow
PostMessageW
LoadMenuW
GetSubMenu
GetMenuItemID
DestroyIcon
LoadImageW
LoadIconW
SendMessageW
SetTimer
KillTimer
EnableWindow
LoadCursorW
shell32
Shell_NotifyIconW
comctl32
ord17
ole32
CoCreateInstance
oleaut32
SystemTimeToVariantTime
SysFreeString
SysAllocString
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??$?9DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE