E:\Red\Orange.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Picture11.JPG_www.myfilehd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Picture11.JPG_www.myfilehd.exe
Resource
win10v2004-20240802-en
General
-
Target
8a36226b252335d22f582dab3f16f8bb_JaffaCakes118
-
Size
155KB
-
MD5
8a36226b252335d22f582dab3f16f8bb
-
SHA1
56b5746ced1199dd2228d34f702f21349c1f35c1
-
SHA256
e335a264225c81d326bca315965aa7ac6df4b4c03ee66b0124eb98d5b5239fb5
-
SHA512
c42ff756c9e111558e5f3897bc8955aba96040df8b47025aa5b0ac8391be61afa163fadf5a96e81a63d5b1985bb57f283d47ffb273548528ae23801c8b687ff8
-
SSDEEP
3072:TF12BxJRUtsuV1fPAzZQV8TQmjtQ9eX2e1dirRlyr7fMnkiIW03S:bCO3XsZQV8U2AndyY3IWcS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Picture11.JPG_www.myfilehd.com
Files
-
8a36226b252335d22f582dab3f16f8bb_JaffaCakes118.zip
-
Picture11.JPG_www.myfilehd.com.exe windows:5 windows x86 arch:x86
8f426527f713af2e8c265db06d482bf3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
GetProcAddress
LoadLibraryA
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
GetCurrentThread
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapDestroy
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
InitializeCriticalSectionAndSpinCount
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
GetLocaleInfoW
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ