d:\Rios\Projects\Skype\bin\release\SkypeNames.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3f60135ebddb408549d8def31c571385_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f60135ebddb408549d8def31c571385_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f60135ebddb408549d8def31c571385_JaffaCakes118
-
Size
309KB
-
MD5
3f60135ebddb408549d8def31c571385
-
SHA1
551154175304efc0770c632c25812ac6d0374902
-
SHA256
93024b76a9819a261292af3d3f53df15ec6fc1b05a4bde08eb6d2569bb6ac40d
-
SHA512
aa9acf5b666d08c3f03599dd8c5080822e09342fac423c8837571c84e7585f4939d0d52810e290de2b56eef5782f22ba3f1e3bec612bab652abd506993957819
-
SSDEEP
6144:5XSDHQ0CggtbcQmgs5/ob4h6dZChxC9/Ez/E:5XUQCgtS5/WdZCSmDE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f60135ebddb408549d8def31c571385_JaffaCakes118
Files
-
3f60135ebddb408549d8def31c571385_JaffaCakes118.exe windows:4 windows x86 arch:x86
f86d7d0fe62f1a2d5d57599c56fe0926
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DebugBreak
OutputDebugStringW
lstrlenA
CloseHandle
SetEvent
GetCurrentProcessId
WaitForSingleObject
GetCurrentThreadId
CreateEventW
CreateThread
GetProcAddress
LoadLibraryW
Sleep
GetCurrentProcess
GetCommandLineW
LocalAlloc
LocalFree
CreateToolhelp32Snapshot
CompareStringW
GetVersionExW
Process32NextW
GetModuleHandleW
Process32FirstW
LoadLibraryA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsValidCodePage
GetOEMCP
GetCPInfo
HeapSize
SetLastError
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
GetModuleFileNameW
lstrcmpiW
InterlockedDecrement
InterlockedIncrement
GetLastError
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
OpenProcess
lstrlenW
TlsFree
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
GetStartupInfoW
GetProcessHeap
ExitThread
IsDebuggerPresent
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
VirtualProtect
VirtualAlloc
GetModuleHandleA
GetSystemInfo
VirtualQuery
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WideCharToMultiByte
user32
UnregisterClassW
UnregisterClassA
PostMessageW
DefWindowProcW
CreateWindowExW
DestroyWindow
PostQuitMessage
RegisterClassW
RegisterWindowMessageW
GetMessageW
DispatchMessageW
TranslateMessage
PostThreadMessageW
CharUpperW
SetTimer
KillTimer
wvsprintfW
MessageBoxW
CharNextW
SendMessageW
advapi32
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
ole32
CoCreateInstance
StringFromGUID2
CoInitialize
CoRegisterClassObject
CoMarshalInterThreadInterfaceInStream
CoInitializeEx
CoGetInterfaceAndReleaseStream
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoRevokeClassObject
oleaut32
SysStringByteLen
SysAllocStringByteLen
VarBstrCmp
RegisterTypeLi
UnRegisterTypeLi
SysAllocString
VariantClear
VariantInit
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringLen
SysAllocStringLen
SysFreeString
Sections
.text Size: 144KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.8rdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE