h:\Исполнитель желаний\Проект Бета\Разработки\NewBot3\Release\NewBot3.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a12a3895e6909d26ed26981543e6b314_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a12a3895e6909d26ed26981543e6b314_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a12a3895e6909d26ed26981543e6b314_JaffaCakes118
-
Size
62KB
-
MD5
a12a3895e6909d26ed26981543e6b314
-
SHA1
92f969ac74f0f39c02cc1af0eabefa42e91bd778
-
SHA256
632846cf227d5663aba8808aea345c0c214a9cf77574ed1470fb725f7a66a228
-
SHA512
100f5e357ac1bba659be1af9d0c0cb4023ab2d62d92ae43c2ec4ad9c0daa9116961029fd32dd55843ea7fe8c5287b7a58c2e16040d8378eb796e5b137b9c1ce9
-
SSDEEP
768:9AFcj5il0mbE7AZctwP9N3OBulyU6Qy0siFCvJ4V7wmdUm1a8koW85hF:GFO5i/EVtwP9VOAydMFCvJgZP1aGr/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a12a3895e6909d26ed26981543e6b314_JaffaCakes118
Files
-
a12a3895e6909d26ed26981543e6b314_JaffaCakes118.exe windows:5 windows x86 arch:x86
c95ad3545b5ebb63c26a12c6226a6ebf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc90u
ord2074
ord5598
ord4664
ord1493
ord4344
ord1751
ord1754
ord6411
ord3355
ord1681
ord4429
ord2650
ord2651
ord3287
ord5803
ord980
ord6381
ord3230
ord6379
ord3229
ord5338
ord3232
ord4553
ord4730
ord5450
ord5447
ord2860
ord2079
ord2445
ord5354
ord4985
ord4890
ord4893
ord4043
ord589
ord794
ord6482
ord4441
ord570
ord996
ord341
ord617
ord5567
ord5675
ord6604
ord3670
ord4681
ord4905
ord3115
ord6018
ord5663
ord5680
ord4996
ord4347
ord2447
ord5676
ord5674
ord3217
ord2087
ord4213
ord5830
ord6741
ord5548
ord1048
ord4179
ord6035
ord2206
ord2251
ord4747
ord6803
ord4173
ord6801
ord4423
ord4448
ord296
ord600
ord813
ord811
ord1599
ord4519
ord2479
ord3803
ord4004
ord388
ord650
ord5137
ord4684
ord4906
ord6553
ord6439
ord3035
ord3340
ord4641
ord2090
ord5171
ord5285
ord4677
ord5945
ord3009
ord5861
ord1462
ord6044
ord5606
ord2239
ord2204
ord6762
ord2867
ord2859
ord4994
ord1137
ord1254
ord286
ord6830
ord3422
ord5154
ord665
ord2490
ord2501
ord2809
ord3018
ord579
ord781
ord5543
ord5793
ord1565
ord814
ord3423
ord280
ord6831
ord404
ord663
ord5535
ord5770
ord6813
ord1552
ord3220
ord285
ord1607
ord4490
ord2081
ord936
ord5512
ord4603
ord3830
ord4009
ord430
ord683
ord5616
ord5016
ord4545
ord2194
ord3070
ord4693
ord2969
ord1686
ord1440
ord3226
ord6376
ord3681
ord2646
ord2645
ord2647
ord2644
ord2643
ord4702
ord5656
ord5601
ord4345
ord1753
ord6410
ord3354
ord4378
ord5293
ord5296
ord4800
ord4805
ord4802
ord4820
ord4823
ord4807
ord5209
ord4596
ord4589
ord5418
ord4810
ord5214
ord4622
ord5224
ord4865
ord4866
ord4109
ord5349
ord4945
ord4946
ord5356
ord4987
ord5487
ord4861
ord4789
ord4927
ord5279
ord5407
ord4955
ord4904
ord5408
ord4942
ord5105
ord4618
ord5384
ord5228
ord4707
ord4797
ord4798
ord5400
ord5230
ord5142
ord4785
ord5239
ord5491
ord5401
ord5079
ord5382
ord4933
ord5397
ord5106
ord4549
ord1376
ord4550
ord293
ord4235
ord4697
ord1728
ord6466
ord5685
ord5683
ord960
ord965
ord969
ord967
ord971
ord2615
ord2635
ord2619
ord2625
ord2623
ord2621
ord2638
ord2633
ord2617
ord2640
ord2628
ord2610
ord2612
ord2630
ord2375
ord2368
ord1641
ord6802
ord4174
ord6804
ord3682
ord5404
ord6375
ord3225
ord1442
ord2139
ord1792
ord1791
ord1727
ord5650
ord2771
ord2983
ord3112
ord4728
ord2966
ord3140
ord2774
ord2893
ord2764
ord4080
ord4081
ord4071
ord2891
ord4348
ord4910
ord4685
ord5615
ord670
ord938
ord6800
ord415
ord4007
ord3819
ord799
ord5655
ord1380
ord2369
ord2676
ord3743
ord406
ord1272
ord801
msvcr90
memset
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
rand
_itoa
_mktime64
_localtime64_s
_time64
srand
__CxxFrameHandler3
kernel32
SetUnhandledExceptionFilter
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
lstrlenW
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
WideCharToMultiByte
Sleep
ExitProcess
GetCurrentProcess
SetPriorityClass
DeleteFileW
CopyFileW
GetWindowsDirectoryW
GetModuleFileNameW
user32
EnableWindow
advapi32
RegSetValueExW
RegCreateKeyExW
RegCloseKey
shell32
SHGetFolderPathW
ShellExecuteExW
urlmon
URLDownloadToFileW
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ