d:\Documents and Settings\Himanshu\Desktop\Netcom3 March 08\_bin\Release\Intelinet.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eb4652b42be4c7eaf3e6fcc1760db445_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb4652b42be4c7eaf3e6fcc1760db445_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb4652b42be4c7eaf3e6fcc1760db445_JaffaCakes118
-
Size
7.0MB
-
MD5
eb4652b42be4c7eaf3e6fcc1760db445
-
SHA1
365ff979de117cfe57233146b92da508bbf25dad
-
SHA256
5a9ba49ce9141d0c0183f9070d9769aaae49add7a33859ae05387137e1198529
-
SHA512
7b8aa0afe4caddc8530d8a0fd63b67880c17be68b94fd1947ed5e3950ba0c63c891e33396e343035abbd70e603f298f116cbaada36ecd3b0061c0fbda6cd038a
-
SSDEEP
196608:EWhwWhwWhcnVBBlWPuO9+NN2BBW+VBBlWPuO9+NN2BBt3:InVBBlWPuO9+NN2BBhVBBlWPuO9+NN25
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb4652b42be4c7eaf3e6fcc1760db445_JaffaCakes118
Files
-
eb4652b42be4c7eaf3e6fcc1760db445_JaffaCakes118.exe windows:4 windows x86 arch:x86
c3903554bccb7e39b5b5739f16181b67
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
backupmanager
?GetManager@BackupManager@@YAAAUIManager@1@XZ
regmanagers
?GetIEPluginManager@RegManagers@@YAAAUIIEPluginManager@1@XZ
?GetHomePageManager@RegManagers@@YAAAUIHomePageManager@1@XZ
?GetUninstallManager@RegManagers@@YAAAUIUninstallManager@1@XZ
?GetStartupManager@RegManagers@@YAAAUIStartupManager@1@XZ
registrychecker
?GetChecker@RegistryChecker@@YAAAUIChecker@1@XZ
spyguard
?GetManager@SpyGuard@@YAAAUISpyGuardManager@1@XZ
logger
?GetLogger@Logger@@YAAAUILogger@1@XZ
spywareremover
?GetScanner@AntiSpyware@@YAAAUIScanner@1@XZ
mfc71
ord3834
ord356
ord6119
ord5807
ord4580
ord1280
ord1063
ord1968
ord3684
ord2368
ord1279
ord5637
ord2902
ord5641
ord5640
ord2527
ord5611
ord6060
ord5608
ord6054
ord4161
ord6057
ord5888
ord6037
ord5727
ord5642
ord5647
ord5523
ord5588
ord5414
ord5401
ord5921
ord5719
ord3180
ord602
ord347
ord4320
ord3934
ord3879
ord5873
ord3875
ord2794
ord2495
ord297
ord1489
ord6118
ord299
ord2933
ord762
ord5833
ord5867
ord2370
ord2164
ord1564
ord2882
ord911
ord1916
ord5529
ord784
ord1482
ord4109
ord2272
ord6167
ord3635
ord3595
ord1920
ord2931
ord5224
ord5227
ord3948
ord4569
ord5230
ord5213
ord5567
ord2838
ord4481
ord570
ord759
ord2249
ord3680
ord2496
ord1654
ord1598
ord3328
ord754
ord3883
ord5868
ord5751
ord3991
ord3997
ord2884
ord2870
ord5563
ord4085
ord3799
ord1929
ord2263
ord651
ord416
ord631
ord2748
ord3931
ord2288
ord2280
ord386
ord4212
ord620
ord4735
ord2662
ord3762
ord2657
ord1554
ord3195
ord354
ord557
ord745
ord1486
ord2131
ord3441
ord3163
ord3204
ord3302
ord2948
ord5613
ord5731
ord2367
ord709
ord501
ord1009
ord3761
ord591
ord1931
ord1483
ord1643
ord2089
ord1547
ord4234
ord3171
ord6306
ord6236
ord1892
ord3648
ord4265
ord4952
ord5205
ord4100
ord2094
ord3244
ord1955
ord2371
ord1283
ord1161
ord5165
ord3109
ord6144
ord3110
ord1025
ord2246
ord1913
ord2615
ord5009
ord5012
ord4309
ord4135
ord2939
ord4904
ord943
ord5356
ord2992
ord2425
ord2424
ord4019
ord1557
ord3945
ord5148
ord2173
ord1306
ord4277
ord2955
ord3207
ord635
ord395
ord6065
ord1395
ord4299
ord865
ord265
ord266
ord3255
ord5331
ord6297
ord5320
ord6286
ord6180
ord3292
ord4353
ord2092
ord1641
ord1571
ord4238
ord2958
ord3230
ord658
ord5866
ord5746
ord2866
ord2654
ord1397
ord6266
ord1933
ord1484
ord1570
ord4237
ord3229
ord657
ord1966
ord3406
ord3990
ord4035
ord6182
ord4108
ord4081
ord502
ord2867
ord6168
ord300
ord2086
ord1545
ord4232
ord3164
ord1550
ord3178
ord599
ord589
ord330
ord2899
ord3401
ord3686
ord6042
ord1123
ord3683
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord5226
ord2248
ord4568
ord5566
ord3333
ord566
ord757
ord5975
ord1054
ord1122
ord1126
ord3830
ord6304
ord3849
ord3108
ord5491
ord1794
ord1793
ord3587
ord2878
ord2346
ord1580
ord2876
ord5634
ord2085
ord3162
ord4017
ord783
ord563
ord4115
ord2264
ord6017
ord3989
ord327
ord2168
ord715
ord605
ord3182
ord4262
ord5203
ord1401
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord5182
ord3641
ord1024
ord4125
ord6305
ord2322
ord876
ord304
ord6090
ord6067
ord753
ord587
ord578
ord326
ord310
ord760
ord3337
ord4244
ord741
ord764
ord572
ord3317
ord4261
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2991
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord1908
ord5152
ord4240
ord1402
ord3946
ord1617
ord1620
ord5915
ord1591
ord2095
ord1903
ord2372
ord3161
ord1934
ord3210
ord1084
ord4888
ord1187
ord1191
ord781
ord6174
ord1581
ord4098
ord1207
msvcr71
strncpy
??8type_info@@QBEHABV0@@Z
strtok
memmove
??0exception@@QAE@ABV0@@Z
_CxxThrowException
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_time64
_localtime64
strftime
__CxxFrameHandler
_except_handler3
_resetstkoflw
free
malloc
_purecall
_mktime64
_beginthreadex
_local_unwind2
wprintf
atol
atoi
isalnum
_itoa
memset
__security_error_handler
??1type_info@@UAE@XZ
_controlfp
__dllonexit
?terminate@@YAXXZ
_stricmp
_strnset
_setmbcp
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_onexit
kernel32
GetModuleFileNameA
CreateDirectoryA
CreateThread
FindResourceA
LoadResource
lstrlenA
GetCurrentProcess
GetVersion
GetLastError
CreateMutexA
GetVersionExA
GetLogicalDriveStringsA
GetLocaleInfoA
GetACP
InterlockedExchange
DeleteCriticalSection
TerminateProcess
OpenProcess
CopyFileA
DeleteFileA
lstrcpynA
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
GetFileAttributesA
CloseHandle
ResetEvent
WaitForSingleObject
SetEvent
WaitForMultipleObjects
SetWaitableTimer
CreateWaitableTimerA
GlobalAlloc
ResumeThread
CreateEventA
GlobalFree
MulDiv
GlobalUnlock
GlobalLock
FreeResource
LockResource
SizeofResource
GetTickCount
Process32Next
Process32First
CreateToolhelp32Snapshot
GetThreadLocale
GetWindowsDirectoryA
WinExec
MultiByteToWideChar
GetFileAttributesExA
InitializeCriticalSection
user32
LoadCursorA
IsZoomed
IsIconic
GetSystemMenu
SetMenuDefaultItem
EnableMenuItem
GetNextDlgGroupItem
WindowFromPoint
GetWindowLongA
DrawFocusRect
DrawEdge
InflateRect
GetCapture
GetFocus
EnumWindows
GetWindowThreadProcessId
ExitWindowsEx
OffsetRect
MessageBoxA
GetCursorPos
LoadImageA
SetForegroundWindow
LoadMenuA
GetSubMenu
SetRect
RegisterWindowMessageA
GetDC
ReleaseDC
SetWindowRgn
DrawIconEx
GetWindowRect
PtInRect
SetCapture
ClientToScreen
SetCursor
ReleaseCapture
SetRectEmpty
GetSystemMetrics
GetSysColor
RedrawWindow
UpdateWindow
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
LoadBitmapA
IsWindow
PostThreadMessageA
EnableWindow
GetParent
KillTimer
SetTimer
InvalidateRect
GetClientRect
SendMessageA
PostMessageA
CopyRect
gdi32
ExtCreateRegion
CreateRectRgn
FillRgn
CombineRgn
CreateRectRgnIndirect
CreateFontIndirectA
CreateFontA
Rectangle
GetStockObject
StretchBlt
GetObjectA
DeleteObject
CreateCompatibleBitmap
DeleteDC
SelectObject
GetDeviceCaps
CreatePatternBrush
CreateSolidBrush
SetBkColor
SetTextColor
SetBrushOrgEx
SetBkMode
CreateBitmap
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetCurrentObject
BitBlt
CreateCompatibleDC
CreateDIBSection
advapi32
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
shell32
SHBrowseForFolderA
SHGetDesktopFolder
ShellExecuteA
SHFileOperationA
Shell_NotifyIconA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetFileInfoA
ExtractIconA
SHGetPathFromIDListA
comctl32
ImageList_AddMasked
ord17
ImageList_Remove
ImageList_ReplaceIcon
ImageList_Draw
_TrackMouseEvent
ImageList_SetBkColor
shlwapi
SHDeleteKeyA
ole32
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
SysFreeString
SystemTimeToVariantTime
SysAllocString
SysAllocStringLen
VariantClear
VarDateFromStr
VariantTimeToSystemTime
VarBstrFromDate
OleLoadPicture
urlmon
URLDownloadToFileA
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEXXZ
?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE_N_N@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
?good@ios_base@std@@QBE_NXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?uncaught_exception@std@@YA_NXZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
?to_char_type@?$char_traits@D@std@@SADABH@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXPBDHH@Z
?eof@ios_base@std@@QBE_NXZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??$?6U?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
?eq_int_type@?$char_traits@D@std@@SA_NABH0@Z
?eof@?$char_traits@D@std@@SAHXZ
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
?to_int_type@?$char_traits@D@std@@SAHABD@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?width@ios_base@std@@QAEHH@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEABDI@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?flags@ios_base@std@@QBEHXZ
?width@ios_base@std@@QBEHXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?open@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXPBDHH@Z
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@XZ
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
wininet
InternetCloseHandle
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
DeleteUrlCacheEntry
Sections
.text Size: 232KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.7MB - Virtual size: 6.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ