d:\Build\CHILI\CHILI5_RELEASE\NeroMediaManager\MediaLibrary\src\NMFirstStart\Release Unicode\NMFirstStart.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d6468f25c26ecc40f695f9323354330d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6468f25c26ecc40f695f9323354330d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6468f25c26ecc40f695f9323354330d_JaffaCakes118
-
Size
158KB
-
MD5
d6468f25c26ecc40f695f9323354330d
-
SHA1
7ac13060ccd4c40a5924c5672f0e0810254fa785
-
SHA256
ab0c77c3c89d126efdc5d588ba6cd2f05c54ad0c3b97e375cb209920f8b79d03
-
SHA512
495a729537728cad109a2f6b6642dc3601e4644ee03d551b64c9dae40f8cbed96dd723456ba7a19f5e648bb6a4ec97e22288f16c3a49a531032fe1254fab90d4
-
SSDEEP
3072:U7/OOf2srkafupCm4gQ9RbEFVD7tV8fB5vPj3Z372u7+0U9qsmCm6/WRlhTEPVZE:ymOfPJuv4jvvvL3Zrn7+NqsmCm6uRwPc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6468f25c26ecc40f695f9323354330d_JaffaCakes118
Files
-
d6468f25c26ecc40f695f9323354330d_JaffaCakes118.exe windows:4 windows x86 arch:x86
b082ec2eeb36eff4b44f9827f8d51b38
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
CreateProcessW
GetModuleFileNameW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
RegisterClassW
DestroyWindow
SetWindowLongW
GetWindowLongW
GetMessageW
TranslateMessage
DispatchMessageW
DefWindowProcW
KillTimer
PostQuitMessage
SetTimer
UnregisterClassW
CreateWindowExW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
msvcp80
?c_str@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEPB_WXZ
?append@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
msvcr80
??3@YAXPAX@Z
free
_wcsdup
__wargv
__argc
__CxxFrameHandler3
memset
_purecall
_vsnwprintf_s
?terminate@@YAXXZ
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE