N:\downx.koreasys1.com\setup\p003_un1\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f53ac30d1aded6fc4d0d25fe7bb9babb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f53ac30d1aded6fc4d0d25fe7bb9babb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f53ac30d1aded6fc4d0d25fe7bb9babb_JaffaCakes118
-
Size
93KB
-
MD5
f53ac30d1aded6fc4d0d25fe7bb9babb
-
SHA1
dcf3a37bcb1519e33e23b9ed522750426957e5c3
-
SHA256
45b7ceef9e5ab216d5a578ea3027f144125a81013e16b1643f6ad11a71e64c2f
-
SHA512
0c680cadeca795bb989f192ba96ea27bf26b3f0266e8eb2b9b8453bac6374851cbd15360570020e6701eb243c2284fd5df76c650c04057cf2a61e96b84760320
-
SSDEEP
1536:ef4sUOZKI7JSIqzesMo3GPd8dyQrcG2GsQG6Sd5GF:efBDqzQMy2YQG6Sd5GF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f53ac30d1aded6fc4d0d25fe7bb9babb_JaffaCakes118
Files
-
f53ac30d1aded6fc4d0d25fe7bb9babb_JaffaCakes118.exe windows:5 windows x86 arch:x86
66e67f55c70de8cba11873b6f3009918
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
GetProcAddress
GetLastError
CloseHandle
SetLastError
GetLocalTime
Sleep
GetModuleFileNameA
GetTempPathA
DeleteFileA
MoveFileA
CreateMutexA
lstrcatA
lstrcpyA
ExpandEnvironmentStringsA
GetFileAttributesExA
WaitForSingleObject
CreateThread
GetTickCount
lstrlenA
ReadFile
GetProcessHeap
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileA
SetFilePointer
InitializeCriticalSectionAndSpinCount
LoadLibraryA
HeapReAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
ExitProcess
EnterCriticalSection
LeaveCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
advapi32
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
shell32
ShellExecuteA
ole32
CoInitialize
user32
wsprintfA
FindWindowA
shlwapi
PathGetArgsA
PathFindFileNameA
PathFileExistsA
PathRemoveBlanksA
ws2_32
connect
__WSAFDIsSet
socket
htons
select
ioctlsocket
closesocket
send
gethostbyname
recv
WSAStartup
netapi32
Netbios
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ