e:\Work\NEWGameMuma7.30\Release\GameMuma.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5cb85ea548224948a98c5752e13d685f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5cb85ea548224948a98c5752e13d685f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5cb85ea548224948a98c5752e13d685f_JaffaCakes118
-
Size
92KB
-
MD5
5cb85ea548224948a98c5752e13d685f
-
SHA1
9b111b25bbc0d167cf49389da6ec56d84a1add01
-
SHA256
877ab5747104b80e4f22484f7490f110cd1dc803902833a1b411263945f2faaa
-
SHA512
fee661ab9bd52512f20c250236b6ca553db332647f585699445564cbbb584b31a0fe41be4f48a29feff6ad4b8c2193bb8acd791d831cfd078016458384ad91aa
-
SSDEEP
1536:eJ/oa8sVvSmPhDe/VPlFHTLVBp275r9ilHk2ls:eJCsXmNFzkN9ilH/2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5cb85ea548224948a98c5752e13d685f_JaffaCakes118
Files
-
5cb85ea548224948a98c5752e13d685f_JaffaCakes118.exe windows:4 windows x86 arch:x86
35ce76355c0afb1945478e6118e08ad8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TerminateProcess
OpenProcess
Process32Next
CreateToolhelp32Snapshot
GetSystemDirectoryA
Sleep
GetFileTime
CreateFileA
GetCurrentProcess
lstrcatA
lstrcpyA
lstrlenA
GetModuleFileNameA
GetVersionExA
GetComputerNameA
CopyFileA
CreateThread
InterlockedExchange
GetACP
GetLocaleInfoA
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
WideCharToMultiByte
GetProcAddress
LoadLibraryA
WriteFile
CloseHandle
SetEndOfFile
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetCPInfo
GetOEMCP
HeapSize
HeapReAlloc
SetFilePointer
ReadFile
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
SetUnhandledExceptionFilter
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
RtlUnwind
GetThreadContext
FlushInstructionCache
SetThreadContext
ReadProcessMemory
VirtualProtectEx
WriteProcessMemory
DebugActiveProcess
WaitForDebugEvent
ContinueDebugEvent
ExitProcess
user32
SendMessageA
GetWindowTextA
WindowFromPoint
GetCursorPos
GetClassNameA
CreateWindowExA
GetAsyncKeyState
GetForegroundWindow
wsprintfA
DestroyWindow
DefWindowProcA
EndPaint
BeginPaint
PostQuitMessage
RegisterClassExA
LoadCursorA
GetWindowThreadProcessId
GetDlgItem
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
advapi32
RegCloseKey
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
ShellExecuteA
psapi
GetModuleFileNameExA
EnumProcessModules
urlmon
URLDownloadToFileA
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shrink Size: 29B - Virtual size: 29B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ