s:\trayapp\TrayApp\RegRepair\Release\hpqrrx08.pdb
Static task
static1
Behavioral task
behavioral1
Sample
38cb2dff91b2b84881013b8fb6eda410_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38cb2dff91b2b84881013b8fb6eda410_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38cb2dff91b2b84881013b8fb6eda410_JaffaCakes118
-
Size
217KB
-
MD5
38cb2dff91b2b84881013b8fb6eda410
-
SHA1
b75dfb3da71ea249e384db1cadcd83b140d185f1
-
SHA256
daf691b0d69ffb96a30cdc91b8c9d7d85eff9e445ca33675e39656b9527e5a95
-
SHA512
f56cabae8cafb335bb34063f95c09fac84fc0ff4901b8535557f4d462661090a2547ecf35bc6d724cb9c0cb9e0c71eef80b924d813eb02237cb16399b97fd5ec
-
SSDEEP
3072:1p7vf4zHXP4Zq5b9b52tz4XiJrx1D9MIEE+lPeh+0GfdzpET:Az/aU9NkOiRx1KRl2h+nBpY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38cb2dff91b2b84881013b8fb6eda410_JaffaCakes118
Files
-
38cb2dff91b2b84881013b8fb6eda410_JaffaCakes118.exe windows:5 windows x86 arch:x86
5189d9ee1b4eefc99f701a48a737ee34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
LoadLibraryA
LocalFree
GetProcAddress
FreeLibrary
GetFileAttributesA
CreateDirectoryA
GetShortPathNameA
LocalLock
LocalUnlock
SetFilePointer
WriteFile
OutputDebugStringA
GetLastError
FormatMessageA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
lstrcmpiA
FlushFileBuffers
lstrcpyA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
HeapSize
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
LocalAlloc
SetErrorMode
CloseHandle
CreateFileA
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
ExitProcess
GetCurrentDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableA
GetDriveTypeA
GetFullPathNameA
HeapFree
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
HeapAlloc
VirtualAlloc
HeapReAlloc
RaiseException
user32
BeginPaint
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
RegisterClassExA
LoadCursorA
SendMessageA
PostQuitMessage
EndPaint
LoadIconA
SetWindowPos
MapWindowPoints
GetWindowRect
GetDlgItem
PostMessageA
GetClientRect
DefWindowProcA
DestroyWindow
DialogBoxParamA
EndDialog
UpdateWindow
ShowWindow
CreateWindowExA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
shell32
SHGetFolderPathA
ole32
StringFromGUID2
oleaut32
SysAllocString
SysStringLen
VarBstrCat
SysAllocStringLen
SysFreeString
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ