s:\NeroHomeOctane\NeroMediaManager_OCTANE4_RELEASE\NeroMediaManager\Transcoder\src\NMTTranscoderOOP\Release Unicode\NMSTranscoder.pdb
Static task
static1
Behavioral task
behavioral1
Sample
463114f79f776b6cf490c11e0cf0d21c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
463114f79f776b6cf490c11e0cf0d21c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
463114f79f776b6cf490c11e0cf0d21c_JaffaCakes118
-
Size
103KB
-
MD5
463114f79f776b6cf490c11e0cf0d21c
-
SHA1
71dbcada904217ef70badf96dca888d6913f013a
-
SHA256
7eec2b014effe97f915ea9cadabdf15b8289c888fa57dab3066cff9b99c57db6
-
SHA512
34edc4033c4a58ef11dacc1e4e2eef61ec8eeaf834721d5ef6406c487575efbe6e9fe430c14382ec0ccc0ed7a190d8163c57db35c35eb574f7c365bb0de72425
-
SSDEEP
3072:ys02QN2nuCOeA2ZjK8gj6QccPpB9e0ZPPZv0C447TYbLaj:sNeE2ZWRj0cP5PP+DaUbLaj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 463114f79f776b6cf490c11e0cf0d21c_JaffaCakes118
Files
-
463114f79f776b6cf490c11e0cf0d21c_JaffaCakes118.exe windows:4 windows x86 arch:x86
e1d6d8724d687f0871742b0265ed878a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrcmpiW
GetModuleFileNameW
Sleep
CreateThread
CreateEventW
lstrcpynW
lstrcatW
GetCurrentThreadId
SetEvent
InterlockedIncrement
InterlockedDecrement
FreeLibrary
lstrcpyW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
GetCommandLineW
FreeConsole
SetConsoleTitleW
AllocConsole
GetVersionExA
ExitProcess
GetModuleHandleA
GetStartupInfoW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrlenW
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
WaitForSingleObject
MultiByteToWideChar
CloseHandle
user32
TranslateMessage
DispatchMessageW
GetMessageW
PostThreadMessageW
CharNextW
CharUpperW
advapi32
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
ole32
CoResumeClassObjects
CoCreateInstance
StringFromGUID2
CoTaskMemFree
CoTaskMemAlloc
CoRegisterClassObject
CoRevokeClassObject
CoSuspendClassObjects
CoUninitialize
CoInitializeEx
CoTaskMemRealloc
oleaut32
RegisterTypeLi
SysAllocString
VarUI4FromStr
SysFreeString
UnRegisterTypeLi
LoadTypeLi
shlwapi
PathFindExtensionW
msvcp71
?_Nomemory@std@@YAXXZ
msvcr71
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_amsg_exit
_wcmdln
exit
_controlfp
__p__commode
_cexit
_XcptFilter
_exit
_c_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
__security_error_handler
__set_app_type
??_V@YAXPAX@Z
malloc
free
_CxxThrowException
_except_handler3
??3@YAXPAX@Z
__p__fmode
__CxxFrameHandler
wcsncpy
realloc
fputws
freopen
_iob
_purecall
memset
_callnewh
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rrdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE