d:\Plugins for Browsers\facerange\Sources FTP Database\installers\release\Real Player orange button installapi and monitizer\Xvid Installation.pdb
Static task
static1
Behavioral task
behavioral1
Sample
62cf589ab378557999944915d6992dfa_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
62cf589ab378557999944915d6992dfa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62cf589ab378557999944915d6992dfa_JaffaCakes118
-
Size
773KB
-
MD5
62cf589ab378557999944915d6992dfa
-
SHA1
8e837f4db3ed73eb27ca878bc194df9453d9fd06
-
SHA256
4314fe3c13e43d7d783aa7059aa4b4bbbc107e9a7659c3dd55363986686f54b3
-
SHA512
3ea1ee0daf10d40a9267678a82ac68cbb9eab93e2879c535d4d8b4e6b7e01a033ec589dde8f5f44472d0e6936907c942eda16ce402c40b34fc81bb6c0f129269
-
SSDEEP
12288:sqU3waliKDua9pGHNu4B2US9pGHNu4B2U:y3weiKD6I4rrI4r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 62cf589ab378557999944915d6992dfa_JaffaCakes118
Files
-
62cf589ab378557999944915d6992dfa_JaffaCakes118.exe windows:5 windows x86 arch:x86
d3d3415f5c79c8f4598b3d6e5590d768
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoW
HttpQueryInfoA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetOpenA
kernel32
ResumeThread
WriteFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
CreateThread
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapSize
LCMapStringW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
CreateDirectoryA
Sleep
GetExitCodeProcess
Process32Next
GetLastError
OpenProcess
Process32First
CreateToolhelp32Snapshot
WaitForSingleObject
GetFileSize
CreateFileA
GetProcAddress
LoadLibraryA
CloseHandle
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
GetFileType
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
HeapAlloc
user32
SetWindowTextA
SendMessageA
GetDlgItem
SetWindowPos
OffsetRect
CopyRect
GetWindowRect
GetDesktopWindow
GetParent
EndDialog
GetDlgCtrlID
GetSysColor
DialogBoxParamA
GetClientRect
SetCursor
PostMessageA
InvalidateRect
PtInRect
SetWindowRgn
LoadBitmapA
SetRect
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
UpdateWindow
ShowWindow
MessageBoxA
SetWindowLongA
GetWindowLongA
CreateWindowExA
GetSystemMetrics
RegisterClassExA
LoadCursorA
TranslateAcceleratorA
LoadAcceleratorsA
TranslateMessage
DispatchMessageA
GetMessageA
LoadStringA
gdi32
SetBkMode
CreateRectRgn
SetBkColor
DeleteDC
DeleteObject
BitBlt
LineTo
MoveToEx
CreatePen
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
CreateSolidBrush
ExtTextOutA
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegOpenKeyA
shell32
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
shlwapi
PathFileExistsA
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 690KB - Virtual size: 689KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ