c:\halopc\haloce\objects\haloupdate_rretail\haloupdate.pdb
Static task
static1
Behavioral task
behavioral1
Sample
499f5b00a28e087d209a8c04bb68429e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
499f5b00a28e087d209a8c04bb68429e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
499f5b00a28e087d209a8c04bb68429e_JaffaCakes118
-
Size
320KB
-
MD5
499f5b00a28e087d209a8c04bb68429e
-
SHA1
6badb61d2fead3cc392c15d00cf4878a434634dd
-
SHA256
ef325ed82fb156ac2c349d6381e9a006132c01643f5e6be7dde1a97168e71094
-
SHA512
dcfce1d7aca8b39325dd9a0d41f3cbcbfce9633be9c25e7eeaf8fbf7b97d81ced087c1310dfb12f50a409d7f08019976fe2020d2e1244a58b641ba99184fda8a
-
SSDEEP
6144:vm86JC04Bd2t+W5/dANcD9fCRc4bl7diRY3lHKxsEE:wJC04P2cW5/mC0cA7sm3lqxrE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 499f5b00a28e087d209a8c04bb68429e_JaffaCakes118
Files
-
499f5b00a28e087d209a8c04bb68429e_JaffaCakes118.exe windows:4 windows x86 arch:x86
351bf000289f40cb27ed1429f13b4e5f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
timeGetTime
patchw32
ord1
setupapi
SetupIterateCabinetA
wininet
InternetQueryOptionW
kernel32
CreateFileA
GetProcAddress
LoadResource
LockResource
SizeofResource
ReadFile
GetCurrentProcess
QueryPerformanceCounter
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CompareStringA
InterlockedExchange
GetModuleHandleA
GetModuleFileNameA
WriteFile
GetSystemDirectoryA
LoadLibraryA
SetLastError
GetACP
RtlUnwind
GetLocaleInfoA
GetCurrentThreadId
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
GetStringTypeA
IsBadWritePtr
GetExitCodeProcess
GetCurrentProcessId
Sleep
WaitForSingleObject
OpenProcess
CloseHandle
GetLastError
GlobalFree
FreeLibrary
GetOEMCP
SetStdHandle
SetConsoleCtrlHandler
SetEndOfFile
IsBadCodePtr
SetEnvironmentVariableA
SetUnhandledExceptionFilter
IsBadReadPtr
GetWindowsDirectoryA
VirtualFree
HeapCreate
HeapDestroy
FlushFileBuffers
GetTimeZoneInformation
HeapSize
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
TerminateProcess
LCMapStringA
ExitProcess
GetVersionExA
GetCommandLineA
GetStartupInfoA
HeapReAlloc
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
user32
PostQuitMessage
EndPaint
GetClientRect
ShowWindow
SetFocus
GetSystemMetrics
AdjustWindowRect
InvalidateRect
UpdateWindow
TranslateMessage
BeginPaint
ExitWindowsEx
gdi32
SetTextColor
DeleteDC
StretchBlt
SelectObject
CreateCompatibleDC
SetBkMode
GetStockObject
DeleteObject
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
wsock32
getsockopt
gethostbyname
WSACleanup
setsockopt
select
ntohl
WSAStartup
gethostname
inet_ntoa
WSAGetLastError
send
__WSAFDIsSet
recv
closesocket
shutdown
socket
htons
ioctlsocket
connect
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ