c:\Dev\Xbox360\Xplorer360\Original\Release\Xplorer360.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ea8dfe1d512a5ca6a9e848a2c1abe695_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8dfe1d512a5ca6a9e848a2c1abe695_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea8dfe1d512a5ca6a9e848a2c1abe695_JaffaCakes118
-
Size
88KB
-
MD5
ea8dfe1d512a5ca6a9e848a2c1abe695
-
SHA1
53c986b3b4f3c720963baea15e8af2a77ca46c1f
-
SHA256
98efa8636154455d8323dfad8b1b7193aee7f70bd2adcc83471dcab8e937f40c
-
SHA512
59b0294adcfac8af3413a8565dc194afa73beade283e0702ffadef370dc8a24be438507ac8e4758462ac191dee9a330ba6aa9212ea832689c8bb070c12eaff57
-
SSDEEP
1536:hKk4cgVVMjCRnIkc+eXrsReT97erGux2kx/fivizArRGRYf1XSW:hKk7wnIk6XVMx2kx/f2iQGA1C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea8dfe1d512a5ca6a9e848a2c1abe695_JaffaCakes118
Files
-
ea8dfe1d512a5ca6a9e848a2c1abe695_JaffaCakes118.exe windows:4 windows x86 arch:x86
c26b858e8079c143fb27665ad7e46977
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SHFileOperationA
DragQueryFileA
ShellExecuteA
SHGetPathFromIDListA
SHGetFileInfoA
SHBrowseForFolderA
urlmon
CopyStgMedium
setupapi
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsA
kernel32
GetStartupInfoA
ExitProcess
RaiseException
GetVersionExA
DebugBreak
QueryPerformanceCounter
GetTickCount
CreateFileA
GetLogicalDrives
GlobalAlloc
CreateDirectoryA
SetCurrentDirectoryA
GlobalFree
DeviceIoControl
GetCurrentDirectoryA
CloseHandle
GetTempPathA
GetFileSize
WaitForSingleObject
SetEvent
WriteFile
CreateEventA
ReadFile
GetOverlappedResult
FindFirstFileA
GetLastError
ResetEvent
FindNextFileA
GetFileAttributesA
CreateThread
GetModuleHandleW
LoadLibraryW
GetFileAttributesW
GetModuleFileNameW
SetLastError
GetProcAddress
LoadLibraryA
GetModuleHandleA
OutputDebugStringA
GetVersion
lstrlenA
GlobalLock
GlobalUnlock
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CancelIo
GetCurrentThreadId
GetCurrentProcessId
FreeLibrary
GetProcessHeap
HeapFree
GetCurrentProcess
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapAlloc
user32
PeekMessageA
MessageBoxA
SetTimer
GetDlgCtrlID
LoadCursorA
CallWindowProcA
GetSysColorBrush
EndDialog
GetDlgItem
SetWindowLongA
SetPropA
RegisterClipboardFormatA
GetCursorPos
PostQuitMessage
SetCapture
GetKeyState
GetFocus
LoadIconA
wsprintfA
GetClientRect
CheckMenuRadioItem
EnableMenuItem
DefWindowProcA
ShowWindow
ReleaseCapture
RegisterClassA
MoveWindow
GetMessageA
TranslateMessage
ChildWindowFromPoint
DispatchMessageA
SetWindowTextA
UpdateWindow
DialogBoxParamA
SetDlgItemTextA
ScreenToClient
TrackPopupMenu
GetSubMenu
GetMenu
GetWindowTextA
GetWindowLongA
CreateWindowExA
MsgWaitForMultipleObjectsEx
SetCursor
GetPropA
SendMessageA
gdi32
SetTextColor
CreateFontIndirectA
SetBkMode
DeleteObject
SelectObject
GetObjectA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
ole32
RevokeDragDrop
OleInitialize
OleUninitialize
ReleaseStgMedium
CoCreateInstance
DoDragDrop
RegisterDragDrop
msvcr71
_getcwd
_mkdir
time
strncmp
strlen
sprintf
strcat
_chdir
_itoa
_controlfp
?terminate@@YAXXZ
__security_error_handler
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
vsprintf
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
_snprintf
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
memcmp
strcmp
strncpy
_stat
free
memcpy
strcpy
_stricmp
localtime
memset
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ