C:\ob\bora-18463\bora-vmsoft\build\release\toolbox\windows\VMwareTray\VMwareTray.pdb
Static task
static1
Behavioral task
behavioral1
Sample
717c5d30629061d9c8dc2d7f606e519a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
717c5d30629061d9c8dc2d7f606e519a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
717c5d30629061d9c8dc2d7f606e519a_JaffaCakes118
-
Size
56KB
-
MD5
717c5d30629061d9c8dc2d7f606e519a
-
SHA1
d4d369debbf61a2f7f82c4ddb7ec60c32bb8bc98
-
SHA256
2dc9d06750b2d618dfd48a9ea10cf0b631ab9549f331dc85a4aac6b85e0df567
-
SHA512
aa8f657b69309a2fb5f041bf17788f785b8328050cb88f193492be2ebecad3c9586d840bf0ac0f075b244f52fb217d42b154369ea4e8c1f505b51d15cd1143d1
-
SSDEEP
768:B5SkQEMPN9NlZ3YKa+mgBrca7wgmR9oiVowuhZT/eXEq2F6UsM/HWbw:BS35o8hFiEFjZ/HWbw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 717c5d30629061d9c8dc2d7f606e519a_JaffaCakes118
Files
-
717c5d30629061d9c8dc2d7f606e519a_JaffaCakes118.exe windows:4 windows x86 arch:x86
33dd15328a9e2618426a906dfeb48426
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcr71
strncmp
malloc
free
_except_handler3
_getpid
_strnicmp
_strdup
isalnum
strcspn
getenv
_mbsrchr
fgets
_errno
memchr
_stricmp
_stat64
_controlfp
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
sprintf
calloc
strstr
_mbsstr
wcslen
fopen
fclose
_vsnprintf
realloc
printf
vsprintf
_mbschr
_fullpath
vmcontrolpanel.cpl
getEnableSystemTrayExport
enableSystemTrayExport
user32
PostMessageA
DestroyIcon
LoadStringA
LoadImageA
TranslateMessage
DispatchMessageA
GetMessageA
DestroyMenu
TrackPopupMenuEx
SetForegroundWindow
GetCursorPos
SetMenuDefaultItem
AppendMenuA
CreatePopupMenu
DefWindowProcA
CreateWindowExA
RegisterClassA
LoadIconA
RegisterWindowMessageA
FindWindowA
shell32
ShellExecuteA
Shell_NotifyIconA
advapi32
GetUserNameA
OpenThreadToken
ImpersonateSelf
RevertToSelf
GetFileSecurityA
MapGenericMask
AccessCheck
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CloseServiceHandle
kernel32
SetFilePointer
VirtualAlloc
GetTempPathA
GetCurrentThread
GetFileAttributesA
CreateFileA
CloseHandle
WriteFile
FormatMessageA
GetLastError
LocalFree
OutputDebugStringA
GetStartupInfoA
GetModuleHandleA
lstrcatA
lstrlenA
lstrcpyA
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
FreeLibrary
GetVersionExA
CreateThread
Sleep
WinExec
VirtualFree
CreateMutexA
ReleaseMutex
WaitForSingleObject
LockFileEx
GetCurrentProcessId
DeleteFileA
UnlockFileEx
GetTickCount
GetProcAddress
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE