c:\Documents and Settings\inet\Pulpit\project\AJAX\media_inform_ru.pdb
Static task
static1
Behavioral task
behavioral1
Sample
84ae9ff12e736bc074ccf44534810462_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
84ae9ff12e736bc074ccf44534810462_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84ae9ff12e736bc074ccf44534810462_JaffaCakes118
-
Size
320KB
-
MD5
84ae9ff12e736bc074ccf44534810462
-
SHA1
94f829a585005bdb88fc2ba729da9d0a11648639
-
SHA256
5fadafd163d1e04a805ab4015b75d6f9bce954e565b8d3511122c1172328ba8b
-
SHA512
73325016d8cd5d8f7bc4a1b44aec02b1eead73b2cd4e567ed23d40c1bb93c01f4c9360042bda9c337d4b78e36ab0383da1759cfb4b6323bce4af128a57a0edbe
-
SSDEEP
3072:pb/QUpoBIYAZ24QAvKeuqnUITsYJZqZpxXdbiNJY9Gv6xDOatdM+/d04FtR:pbPpoBIYAZrvKGRA9DbmJY9U9aM+/dP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84ae9ff12e736bc074ccf44534810462_JaffaCakes118
Files
-
84ae9ff12e736bc074ccf44534810462_JaffaCakes118.exe windows:4 windows x86 arch:x86
03ae8436b31605b0ac6e14920d3722cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetGetConnectedState
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
ws2_32
closesocket
gethostbyname
socket
WSAStartup
recv
send
connect
htons
kernel32
EnumSystemLocalesA
GetUserDefaultLCID
CloseHandle
WriteFile
CreateFileW
LockResource
LoadResource
SizeofResource
FindResourceW
GetModuleHandleW
MultiByteToWideChar
GetComputerNameA
FindClose
FindNextFileW
FindFirstFileW
GetTickCount
GetLastError
DeleteFileW
WaitForSingleObject
CreateProcessW
GetStdHandle
CopyFileW
Sleep
FileTimeToSystemTime
GetSystemTime
WideCharToMultiByte
GetCommandLineW
GetLocalTime
LeaveCriticalSection
EnterCriticalSection
SystemTimeToFileTime
DeleteCriticalSection
IsValidLocale
CreateThread
InitializeCriticalSection
GetModuleFileNameW
ReadFile
SetFilePointer
GetFileSize
GetFileInformationByHandle
MapViewOfFile
CreateFileMappingW
UnmapViewOfFile
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LoadLibraryA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
CreateFileA
SetEndOfFile
SetThreadPriority
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
HeapFree
GetSystemTimeAsFileTime
RtlUnwind
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetVersionExA
GetProcessHeap
GetStartupInfoW
LCMapStringA
LCMapStringW
GetCPInfo
GetProcAddress
GetModuleHandleA
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TlsGetValue
user32
GetDesktopWindow
SendMessageW
FindWindowW
MessageBoxW
GetMessageW
TranslateMessage
DispatchMessageW
LoadCursorW
RegisterClassExW
DefWindowProcW
BeginPaint
EndPaint
PostQuitMessage
CreateWindowExW
RegisterDeviceNotificationW
wsprintfW
IsCharAlphaNumericW
advapi32
RegCloseKey
RegCreateKeyW
RegOpenKeyW
RegSetValueExW
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
GetUserNameA
shell32
SHGetMalloc
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetDataFromIDListW
SHGetFolderPathW
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ