c:\views\tamago\QuickTime.proj\projectfiles\sandbox\BuildResults\NoSym\QTTray.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f507b42937623e9478cbcfe448f7490a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f507b42937623e9478cbcfe448f7490a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f507b42937623e9478cbcfe448f7490a_JaffaCakes118
-
Size
520KB
-
MD5
f507b42937623e9478cbcfe448f7490a
-
SHA1
a111a90e6e63e7443762d46cd9b3ca6d0deaf0c4
-
SHA256
6b589cc078a5bb063d6e811d908bdbdb937d86b6af3f3863450b5456a54fb673
-
SHA512
8c0f7a6545cf4c0be64c8cdb40579543f70dd717c5b1fb0d7ec1b87ef7b81182058bd0252f09388f03214fceee456800052befb4841cc4bf1e75abcff16cfad5
-
SSDEEP
6144:6tX6nkTgFSWFF/GI4FcU+FAgaMvvrsk35V++F+FDCXB1BnbBWl1zvHLf:6tX6keHF/aNLuvrf1uybBWl1LHLf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f507b42937623e9478cbcfe448f7490a_JaffaCakes118
Files
-
f507b42937623e9478cbcfe448f7490a_JaffaCakes118.exe windows:4 windows x86 arch:x86
2f8d4487194181f6ff0937f826280ffc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GetVersionExA
WaitForSingleObject
CreateProcessA
ResetEvent
SetEvent
WaitForMultipleObjects
Sleep
CreateThread
GetLastError
CreateMutexA
GetSystemDirectoryA
GetModuleHandleA
TerminateProcess
GlobalFree
GlobalAlloc
ReleaseMutex
GetCurrentProcessId
ReadFile
SetConsoleCtrlHandler
SetStdHandle
SetFilePointer
GetSystemTimeAsFileTime
GetTickCount
FindFirstFileA
GetTimeZoneInformation
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
HeapSize
FlushFileBuffers
IsBadWritePtr
HeapReAlloc
InitializeCriticalSection
InterlockedExchange
GetOEMCP
GetACP
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
GetCPInfo
GetLocaleInfoA
VirtualFree
HeapCreate
OpenProcess
FindClose
CloseHandle
LoadLibraryA
GetProcAddress
FreeLibrary
CreateEventA
GetModuleFileNameA
GetLocaleInfoW
CompareStringA
CompareStringW
QueryPerformanceCounter
SetEnvironmentVariableA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentProcess
GetFileAttributesA
RtlUnwind
GetStartupInfoA
GetCommandLineA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
TlsAlloc
SetLastError
GetCurrentThreadId
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
HeapAlloc
FatalAppExitA
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
WriteFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
HeapDestroy
user32
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
SetWindowLongA
GetWindowLongA
PostQuitMessage
DefWindowProcA
LoadMenuA
GetSubMenu
DestroyMenu
SetMenuDefaultItem
GetCursorPos
SetForegroundWindow
TrackPopupMenu
CreatePopupMenu
GetMenuStringA
ModifyMenuA
EnableMenuItem
FindWindowA
GetWindowThreadProcessId
SendMessageA
AppendMenuA
MessageBoxA
LoadStringA
GetMessageA
TranslateMessage
DispatchMessageA
PostMessageA
wsprintfA
gdi32
GetStockObject
advapi32
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegEnumKeyA
shell32
Shell_NotifyIconA
ShellExecuteA
Sections
.text Size: 204KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 176KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE