C:\Builds\1\RTGCasino\Main - Client\Sources\Client\Release\lbyinst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b57ed27d13e8812a49c3fe975b032ba1_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b57ed27d13e8812a49c3fe975b032ba1_JaffaCakes118
-
Size
559KB
-
MD5
b57ed27d13e8812a49c3fe975b032ba1
-
SHA1
953028755b7906b49f7980b16618c4687edb9811
-
SHA256
0d326462c891fb5c735f3eb0394ffd8094f24224d65192832fd7056d30f994a9
-
SHA512
b968d11addf9ecddf938ff7989bc77ebb8e35085daa9cdf704e88f591e552db906ad45618488b105a3ed16e173836ee12ce3c964d55824012f9539ea05adedb0
-
SSDEEP
6144:bNSj65TioPlTdWTJqP1vTJDAJQXhF8FsTRg88Xb7obhEcgmd0:bNSj65TiotTdWVqtvFDAJOc6hEmd0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b57ed27d13e8812a49c3fe975b032ba1_JaffaCakes118
Files
-
b57ed27d13e8812a49c3fe975b032ba1_JaffaCakes118.exe windows:5 windows x86 arch:x86
1682343d43d92a51b38f9c00118329b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ord17
kernel32
SetFilePointer
CloseHandle
MoveFileExW
LockResource
LoadResource
SizeofResource
LoadLibraryA
CopyFileA
GetModuleFileNameA
Sleep
GetExitCodeProcess
OpenProcess
SetEndOfFile
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileTime
FindClose
WriteFile
InterlockedExchange
GetModuleHandleA
SetLastError
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileA
SetStdHandle
SetConsoleCtrlHandler
HeapReAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
RaiseException
CompareStringA
ReadFile
GetLastError
FreeLibrary
GetOEMCP
GetACP
GetFileType
EncodePointer
DecodePointer
RtlUnwind
HeapFree
HeapAlloc
MoveFileA
GetCommandLineA
HeapSetInformation
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
ExitProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
HeapCreate
HeapDestroy
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FatalAppExitA
SetHandleCount
GetStdHandle
GetProcessHeap
user32
EndDialog
GetDlgItem
ShowWindow
SetFocus
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
EnumChildWindows
DestroyWindow
GetParent
gdi32
DeleteObject
advapi32
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHGetMalloc
Sections
.text Size: 355KB - Virtual size: 354KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 109KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE