klipopga.pdb
Static task
static1
Behavioral task
behavioral1
Sample
24d2bdc50cbb57f476922a42af089850_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24d2bdc50cbb57f476922a42af089850_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
24d2bdc50cbb57f476922a42af089850_JaffaCakes118
-
Size
88KB
-
MD5
24d2bdc50cbb57f476922a42af089850
-
SHA1
7374d9b15893fda980d66b4be35ca21d6ea9ce8f
-
SHA256
1917c5cb797a1d7d69da137f84911b883129009a0241970244ebe43056b52277
-
SHA512
c02af5e2c4540b28163c14df88054e39a2f7a15ea70047f53f9bb0095c56ab2c25e158e770e8e57def005becd99870d32793eb0320230ce709494075b40be077
-
SSDEEP
768:6ss1flzUYr9138scskSflzE+0petPOhKby:6ss1flN9q5skSflACiO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24d2bdc50cbb57f476922a42af089850_JaffaCakes118
Files
-
24d2bdc50cbb57f476922a42af089850_JaffaCakes118.exe windows:4 windows x86 arch:x86
729ac8a35a410c50be8fd1fc20ef75a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dbnmpntw
ConnectionClose
ConnectionError
ConnectionRead
ConnectionVer
wtsapi32
WTSFreeMemory
WTSLogoffSession
WTSSetSessionInformationA
WTSOpenServerA
WTSVirtualChannelRead
WTSVirtualChannelOpen
WTSVirtualChannelQuery
WTSQuerySessionInformationA
WTSQueryUserToken
WTSWaitSystemEvent
WTSEnumerateServersA
WTSVirtualChannelWrite
WTSUnRegisterSessionNotification
WTSVirtualChannelClose
crypt32
CertCreateContext
CertGetNameStringA
CertCloseStore
CertCompareCertificate
CertSaveStore
CryptEncodeObject
CertFindExtension
CertAlgIdToOID
CertFindChainInStore
CertOpenStore
CertControlStore
CertFindAttribute
CryptFindOIDInfo
CertDuplicateCRLContext
CertFreeCRLContext
kernel32
GetTimeFormatA
GetComputerNameA
CompareStringW
SleepEx
SetEnvironmentVariableA
WriteProcessMemory
InterlockedExchange
GetEnvironmentVariableA
WriteFile
CreateMutexA
FoldStringW
GetCurrentDirectoryA
QueryDosDeviceA
CreateSemaphoreW
GetDateFormatW
GetNumberFormatA
InterlockedDecrement
FindResourceExA
CopyFileA
GetCurrentProcess
CreateNamedPipeW
CreateDirectoryA
LoadLibraryA
CreateEventA
GetConsoleAliasW
GetPrivateProfileIntA
GetCurrentThreadId
GetDiskFreeSpaceA
HeapCreate
upnphost
DllGetClassObject
DllRegisterServer
ServiceMain
DllUnregisterServer
DllCanUnloadNow
user32
CharToOemA
LoadCursorA
GetCaretPos
GetWindowLongA
IsWindow
CreateWindowExW
LoadImageW
PostMessageA
DialogBoxParamW
IsZoomed
GetWindowTextA
shlwapi
UrlGetPartA
UrlIsOpaqueA
PathCombineA
PathCompactPathA
PathCommonPrefixA
UrlGetLocationA
UrlIsA
UrlCreateFromPathA
UrlEscapeA
UrlIsNoHistoryA
UrlCompareA
UrlCanonicalizeA
UrlUnescapeA
UrlHashA
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ