D:\BuildScript.NET\crysis2\pc\Build\Bin32\Crysis2DedicatedServer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eeaec1f67d67cf2d77ce0551db33412b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeaec1f67d67cf2d77ce0551db33412b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eeaec1f67d67cf2d77ce0551db33412b_JaffaCakes118
-
Size
131KB
-
MD5
eeaec1f67d67cf2d77ce0551db33412b
-
SHA1
45e7e864e84e7b34688e59c0f56f5b1b05b28d3b
-
SHA256
dc7483dadf98b436d5fbda0d1b2dab648173063cc4a2c3c03f47666ec95ed5d8
-
SHA512
c40c166af154004a21acc4c2d1d67681fe36ef7225622f996847d8f7a53020f6ac0983e52bc11a7ca4babb7ea0c81516b1c1425d4f7a2548c6187a6e01cc3cd2
-
SSDEEP
1536:nzH7+bRG6DntiCn9+u2ttNTerBZ9NL0NkHB68gLd1WmMAlY1S7ScRQs0bka+N4GY:LibMCnymEktWdtLOkQvk9GGY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eeaec1f67d67cf2d77ce0551db33412b_JaffaCakes118
Files
-
eeaec1f67d67cf2d77ce0551db33412b_JaffaCakes118.exe windows:5 windows x86 arch:x86
55c94d96add537fdcf4f12aaeb36bcf4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedCompareExchange
CreateEventA
CloseHandle
ResetEvent
SetEvent
WaitForSingleObject
CreateMutexA
ReleaseMutex
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
CreateSemaphoreA
SignalObjectAndWait
ReleaseSemaphore
GetCurrentThreadId
OutputDebugStringA
LoadLibraryA
GetProcAddress
GetModuleHandleA
DebugBreak
Sleep
CreateDirectoryA
GetCurrentDirectoryA
InterlockedIncrement
InterlockedDecrement
InterlockedExchangeAdd
GetFileAttributesA
SetFileAttributesA
SetCurrentDirectoryW
GetModuleFileNameW
FreeLibrary
GetCommandLineA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedExchange
TerminateProcess
user32
MessageBoxA
GetAsyncKeyState
shlwapi
StrStrIW
PathRemoveFileSpecW
msvcr90
memcpy
memmove
memset
sscanf_s
sprintf
_vsnprintf
strcspn
atof
isupper
islower
_set_invalid_parameter_handler
_set_purecall_handler
exit
isspace
_i64toa
_ui64toa
fclose
fread
ftell
fseek
fopen
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
?terminate@@YAXXZ
_invoke_watson
_controlfp_s
_crt_debugger_hook
_vscprintf
_CIpow
strstr
strrchr
_stricmp
_strnicmp
_ltoa
strchr
_ultoa
Exports
Exports
CryModuleGetMemoryInfo
ModuleInitISystem
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rrdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE