d:\camcue\cue-components\src\Unloader\unload\HpqUnSet\Release\HpqUnSet.pdb
Static task
static1
Behavioral task
behavioral1
Sample
36481e91be1e1dbdf32e81245a5f736b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36481e91be1e1dbdf32e81245a5f736b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
36481e91be1e1dbdf32e81245a5f736b_JaffaCakes118
-
Size
152KB
-
MD5
36481e91be1e1dbdf32e81245a5f736b
-
SHA1
d2ab47d25ce34fa033bb15515de354159114a542
-
SHA256
9c10f5fdf07ae7dd896e79288f4ee68279b42bf4bbb67a65b274e64abe1296e6
-
SHA512
01debcd308cd05c66922b58433b2703025a818c2d28dbbcdd480f9a2fde1d3bdebf196901cc4fc07d77e7718fe2427395b5ce2e1db959c752c19d969fb06685b
-
SSDEEP
3072:IQYa5pkQM/u5LRCEMGOaNzlDCks9lXEKVAh9PJv:1hkQKu5FFMjaFlLWEK49Ph
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36481e91be1e1dbdf32e81245a5f736b_JaffaCakes118
Files
-
36481e91be1e1dbdf32e81245a5f736b_JaffaCakes118.exe windows:4 windows x86 arch:x86
0375a3552ed779dddde99079496dfbb4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc71
ord4481
ord4261
ord3333
ord310
ord566
ord757
ord907
ord304
ord911
ord1489
ord876
ord2902
ord299
ord2933
ord6118
ord1482
ord3997
ord5529
ord300
ord781
ord865
ord4035
ord6179
ord6173
ord784
ord1054
ord3830
ord3641
ord3441
ord1903
ord2086
ord1545
ord5915
ord1620
ord1617
ord3946
ord1402
ord4232
ord5152
ord1908
ord5073
ord6275
ord4185
ord5214
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord3949
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2862
ord2991
ord4486
ord3164
ord572
ord587
ord1794
ord5182
ord4212
ord4735
ord4890
ord2020
ord1671
ord1670
ord1551
ord5912
ord1401
ord4244
ord5203
ord4262
ord605
ord354
ord910
ord5403
ord2468
ord6067
ord4580
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord1084
ord762
ord764
ord297
ord578
ord1187
ord1191
ord2390
ord3683
ord1207
msvcr71
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
__security_error_handler
memset
sprintf
vsprintf
__p___argc
__p___argv
free
_except_handler3
_setmbcp
__CxxFrameHandler
_CxxThrowException
_controlfp
kernel32
MultiByteToWideChar
FreeLibrary
DeleteCriticalSection
InitializeCriticalSection
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetLastError
CreateMutexA
GetProcAddress
MapViewOfFile
OpenFileMappingA
GetTickCount
CreateFileMappingA
UnmapViewOfFile
LoadLibraryA
ReleaseMutex
WaitForSingleObject
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
CloseHandle
GetModuleFileNameA
user32
LoadImageA
SendMessageA
EnableWindow
comctl32
ord17
ole32
CoUninitialize
CLSIDFromProgID
CoCreateInstance
CoInitialize
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ