proquota.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4122f3fc2f8e17414972806a98edd865_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4122f3fc2f8e17414972806a98edd865_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4122f3fc2f8e17414972806a98edd865_JaffaCakes118
-
Size
49KB
-
MD5
4122f3fc2f8e17414972806a98edd865
-
SHA1
c25c8faf8fe3e422e50392f42d7f25abd3f0e4c4
-
SHA256
5e4758b3f72cf9e5fa84869405c97adcfbc45cf692ff7547719c7542b8b5873e
-
SHA512
92125a19d020b7b1a1c58e2cf4747386228678da8fc1d25655a068db00cfd9122968b950f13e9016ed1e23c0fd07e5f2ce62aaed09e145cdd30e596a3eceed4e
-
SSDEEP
1536:23who4+5mBysA3myWMFiuXE7XkBspKWGT:o3x5WQVWMFisQesp0T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4122f3fc2f8e17414972806a98edd865_JaffaCakes118
Files
-
4122f3fc2f8e17414972806a98edd865_JaffaCakes118.exe windows:5 windows x86 arch:x86
76421f84ba0108de00fe5a7b24c9257b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
ord60
Shell_NotifyIconW
comctl32
ord17
advapi32
GetAce
RegNotifyChangeKeyValue
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
SetSecurityInfo
GetSecurityInfo
kernel32
FlushFileBuffers
GetEnvironmentStrings
GetSystemInfo
LocalFree
GetCurrentProcess
lstrcpyW
ExpandEnvironmentStringsW
LocalReAlloc
LocalAlloc
lstrlenW
FindNextFileW
CompareStringW
FindClose
lstrcmpiW
GetLastError
FindFirstFileW
SetLastError
LeaveCriticalSection
EnterCriticalSection
ExitThread
GetEnvironmentVariableW
SetEvent
FindCloseChangeNotification
Sleep
WaitForMultipleObjects
FindNextChangeNotification
CloseHandle
CreateEventW
FindFirstChangeNotificationW
ResumeThread
SetThreadPriority
CreateThread
WaitForSingleObject
InitializeCriticalSection
SetProcessShutdownParameters
OpenEventW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
VirtualProtect
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
GetLocaleInfoA
user32
LoadStringW
SendMessageW
SetWindowPos
GetDesktopWindow
GetParent
GetSystemMetrics
GetWindowLongW
GetWindowRect
SetForegroundWindow
CheckDlgButton
GetClientRect
EndDialog
PostMessageW
GetDlgItem
IsDlgButtonChecked
SendDlgItemMessageW
SetDlgItemTextW
KillTimer
SetTimer
LoadImageW
DialogBoxParamW
MessageBoxW
DefWindowProcW
LoadIconW
PostQuitMessage
DispatchMessageW
TranslateMessage
GetMessageW
CreateWindowExW
RegisterClassW
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE