N:\downx.koreasys1.com\setup\p005_wsk1\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
67e8bc552cc101a72527ee188ee2947c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67e8bc552cc101a72527ee188ee2947c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67e8bc552cc101a72527ee188ee2947c_JaffaCakes118
-
Size
93KB
-
MD5
67e8bc552cc101a72527ee188ee2947c
-
SHA1
9347a232bcdbc6efba64ed49059c171cdcbf4b2a
-
SHA256
3af2005a6aef4d047d19970b2e5bec029eeeb7b8a119d110c127e6ce96b41acf
-
SHA512
d99f7e60abe621497205eb25a745c73b5aeca736311628e9956b9bcb93454eaa791c0e2d94e3199b2c92a59e7ef841564f47dd32063d29f73659eb552c8ae7f7
-
SSDEEP
1536:0/IbVepaI7JSIyiEesMosGPdDPzJ2gN7nvZcgPVGFFd5G4q:0/tDyiE7DP9BN7ZcgPqFd5G4q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67e8bc552cc101a72527ee188ee2947c_JaffaCakes118
Files
-
67e8bc552cc101a72527ee188ee2947c_JaffaCakes118.exe windows:5 windows x86 arch:x86
66e67f55c70de8cba11873b6f3009918
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
GetProcAddress
GetLastError
CloseHandle
SetLastError
GetLocalTime
Sleep
GetModuleFileNameA
GetTempPathA
DeleteFileA
MoveFileA
CreateMutexA
lstrcatA
lstrcpyA
ExpandEnvironmentStringsA
GetFileAttributesExA
WaitForSingleObject
CreateThread
GetTickCount
lstrlenA
ReadFile
GetProcessHeap
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileA
SetFilePointer
InitializeCriticalSectionAndSpinCount
LoadLibraryA
HeapReAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
ExitProcess
EnterCriticalSection
LeaveCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
advapi32
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
shell32
ShellExecuteA
ole32
CoInitialize
user32
wsprintfA
FindWindowA
shlwapi
PathGetArgsA
PathFindFileNameA
PathFileExistsA
PathRemoveBlanksA
ws2_32
connect
__WSAFDIsSet
socket
htons
select
ioctlsocket
closesocket
send
gethostbyname
recv
WSAStartup
netapi32
Netbios
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ