D:\Downloads\Telegram Desktop\khani1\x64\Release\OpYt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6581f3a93b3c3177d1cdb6cee5199c98_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6581f3a93b3c3177d1cdb6cee5199c98_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6581f3a93b3c3177d1cdb6cee5199c98_JaffaCakes118
-
Size
4.8MB
-
MD5
6581f3a93b3c3177d1cdb6cee5199c98
-
SHA1
fdeacaf3f346380b06c1bda280a1b6c6ee6f6435
-
SHA256
320ae2aea194a17d77ce6d2b0febb28f40539f2ffe96cf19eac0f05c58d2d946
-
SHA512
ab6f9a503892dbdbdb25a67e918ea406e0594cfec4bb8189005912b7032becc589bd434269c3c7e8d252ed5d2495fe41349a5b25057fa3e044de41579d6b9b63
-
SSDEEP
49152:MGtlqe7IU6ifK1jcVRAuv+U/7QEyws807CVpXfKdfaiLgqZG8MKXNeoU+bFZwVbs:w+fK2DC807CVpmFi0Wzo7NX553BxB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6581f3a93b3c3177d1cdb6cee5199c98_JaffaCakes118
Files
-
6581f3a93b3c3177d1cdb6cee5199c98_JaffaCakes118.exe windows:6 windows x64 arch:x64
c4e18c3ce880bdeb907eb2ed32caa98b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
ntohs
shutdown
htons
getsockopt
getsockname
getpeername
connect
bind
WSASetLastError
select
__WSAFDIsSet
WSAGetLastError
inet_pton
setsockopt
WSAIoctl
getnameinfo
gethostname
sendto
recvfrom
ntohl
freeaddrinfo
getaddrinfo
ioctlsocket
listen
htonl
socket
send
recv
closesocket
accept
WSACleanup
WSAStartup
wldap32
ord46
ord211
ord60
ord45
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord143
ord301
ord200
crypt32
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertAddCertificateContextToStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
dwmapi
DwmExtendFrameIntoClientArea
d3d11
D3D11CreateDeviceAndSwapChain
d3dcompiler_47
D3DCompile
d3dx11_43
D3DX11CompileFromMemory
advapi32
CryptGetHashParam
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
GetTokenInformation
CryptReleaseContext
CryptAcquireContextA
CreateServiceA
CloseServiceHandle
OpenSCManagerA
DeleteService
ChangeServiceConfigA
ControlService
StartServiceA
OpenServiceA
CopySid
IsValidSid
OpenProcessToken
ConvertSidToStringSidW
GetLengthSid
kernel32
FreeLibraryAndExitThread
CreateFileW
GetDriveTypeW
ExitThread
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
WriteConsoleW
InterlockedPushEntrySList
RtlUnwindEx
GetModuleFileNameW
VirtualQuery
VirtualProtect
VirtualAlloc
GetSystemInfo
LoadLibraryExW
GetFileInformationByHandle
SetFilePointerEx
SetConsoleCtrlHandler
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
FlushFileBuffers
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
RtlPcToFileHeader
ReadProcessMemory
OutputDebugStringA
ExitProcess
HeapFree
GetCurrentProcess
InitializeCriticalSectionEx
HeapSize
MultiByteToWideChar
Sleep
GetLastError
HeapReAlloc
CloseHandle
RaiseException
HeapAlloc
DecodePointer
HeapDestroy
LocalFree
DeleteCriticalSection
GetProcessHeap
WideCharToMultiByte
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
VerSetConditionMask
FreeLibrary
QueryPerformanceCounter
WriteFile
GetCurrentDirectoryA
OpenProcess
CreateFileA
DeleteFileA
FreeConsole
CreateThread
WriteProcessMemory
VirtualProtectEx
VirtualAllocEx
VirtualFreeEx
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
VirtualQueryEx
SetLastError
FormatMessageA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SleepEx
GetSystemDirectoryA
GetModuleHandleA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
GetFileSizeEx
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
FormatMessageW
GetModuleHandleW
RtlUnwind
GetSystemTimeAsFileTime
RtlVirtualUnwind
SwitchToFiber
DeleteFiber
CreateFiber
LoadLibraryW
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
EncodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
CreateEventW
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
OutputDebugStringW
GetCurrentProcessId
user32
CreateWindowExW
SetWindowPos
GetWindowRect
FindWindowExW
DefWindowProcW
GetDesktopWindow
MessageBoxA
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
GetCursorPos
SetCursorPos
ReleaseCapture
GetClientRect
SetCursor
SetCapture
GetSystemMetrics
GetForegroundWindow
IsChild
ClientToScreen
GetCapture
ScreenToClient
GetKeyState
GetWindowTextW
IsIconic
SetForegroundWindow
TranslateMessage
EnumWindows
PeekMessageW
DispatchMessageW
GetClassNameA
MessageBoxW
SetWindowLongW
GetWindowLongW
GetProcessWindowStation
GetUserObjectInformationW
FindWindowW
RegisterClassExW
ShowWindow
SetLayeredWindowAttributes
MoveWindow
GetAsyncKeyState
LoadCursorW
mouse_event
shell32
ShellExecuteW
ShellExecuteA
userenv
UnloadUserProfile
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
imm32
ImmSetCompositionWindow
ImmGetContext
ImmReleaseContext
bcrypt
BCryptGenRandom
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ