c:\Documents and Settings\Ansell\Desktop\neoncube_1_1_BETA-Rasqual-mod-V5-2005-1011\neoncube_export\neoncube.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c0a01af420fa7b814cab238ba67b44f6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0a01af420fa7b814cab238ba67b44f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0a01af420fa7b814cab238ba67b44f6_JaffaCakes118
-
Size
602KB
-
MD5
c0a01af420fa7b814cab238ba67b44f6
-
SHA1
de74805e35814ee42b004c2fe25aeceda01ce81b
-
SHA256
c283e27ead9c227ab3115eb70b19c1c44230b18cd82dbae3c393982c73046d7f
-
SHA512
3176cf3e64c6229c2614b824fbe3bc423cf55491a8aaf3ef72d638ce0e6d7bcf1b92a1929086bf49572774e1ed640ded5af8895f8c71e729b4871c9727dd5cf2
-
SSDEEP
12288:jucoKWycPguUJfEWVDSEV4rNX1nwq9LEt1G9TwHoSsPT:jdeq4p1EzG9TcoSoT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0a01af420fa7b814cab238ba67b44f6_JaffaCakes118
Files
-
c0a01af420fa7b814cab238ba67b44f6_JaffaCakes118.exe windows:4 windows x86 arch:x86
46460b567aca62df983efe864914d9f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ord17
_TrackMouseEvent
wininet
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
InternetOpenA
InternetConnectA
HttpOpenRequestA
shlwapi
PathCombineA
PathIsDirectoryA
PathIsPrefixA
PathRemoveBackslashA
PathFileExistsA
PathRemoveFileSpecA
kernel32
lstrcpyA
lstrlenA
lstrcpyW
lstrlenW
lstrcatA
GlobalAlloc
WideCharToMultiByte
MultiByteToWideChar
CreateDirectoryA
lstrcmpiA
GetSystemInfo
GetPrivateProfileIntA
GetLastError
CreateMutexA
GetFileAttributesA
FindClose
lstrcmpA
FindNextFileA
FindFirstFileA
ExitProcess
CloseHandle
CreateProcessA
GetPrivateProfileStringA
DeleteFileA
GetModuleFileNameA
CreateFileMappingA
GetFileSize
CreateFileA
lstrcpynA
ReadFile
UnmapViewOfFile
MapViewOfFile
SetFilePointerEx
WriteFile
MoveFileA
HeapFree
HeapAlloc
GetProcessHeap
GetFileSizeEx
GlobalFree
TerminateThread
CreateThread
Sleep
FlushFileBuffers
SetFilePointer
SetEndOfFile
SetFileTime
GetFileTime
GetFileType
CreateFileW
GetStdHandle
IsDBCSLeadByte
GetUserDefaultLCID
GetLocaleInfoW
GetDriveTypeA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
GetFullPathNameA
GetFullPathNameW
DeviceIoControl
CreateDirectoryW
LocalFileTimeToFileTime
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetSystemTime
GetVersionExA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
FindNextFileW
FindFirstFileW
GetLocaleInfoA
HeapSize
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
VirtualAlloc
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
RemoveDirectoryA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetOEMCP
GetACP
SetHandleCount
GetConsoleMode
GetConsoleCP
InitializeCriticalSection
LoadLibraryA
InterlockedExchange
FreeLibrary
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
SetConsoleCtrlHandler
GetDateFormatA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
GetTimeZoneInformation
GetCPInfo
DeleteCriticalSection
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetSystemTimeAsFileTime
HeapReAlloc
GetStartupInfoA
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
user32
CharUpperA
CharLowerA
CharToOemA
OemToCharBuffA
OemToCharA
GetClientRect
GetSystemMetrics
CharToOemBuffA
GetMessageA
TranslateMessage
DispatchMessageA
BeginPaint
EndPaint
PostQuitMessage
GetWindowLongA
CreateWindowExA
ShowWindow
LoadIconA
LoadCursorA
RegisterClassExA
DefWindowProcA
SendMessageA
LoadImageA
SetWindowLongA
CallWindowProcA
GetDC
GetWindowRect
UpdateWindow
MessageBoxA
gdi32
DeleteObject
GetStockObject
GetObjectA
CreateCompatibleDC
SelectObject
StretchBlt
DeleteDC
BitBlt
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
SetFileSecurityW
SetFileSecurityA
OpenProcessToken
shell32
SHFileOperationW
ShellExecuteA
SHFileOperationA
ole32
OleCreate
OleSetContainedObject
OleInitialize
OleUninitialize
oleaut32
VariantInit
SysAllocString
VariantClear
Sections
.text Size: 480KB - Virtual size: 480KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ