klipopga.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2579596aca7169d46c141cc5bf6b1340_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2579596aca7169d46c141cc5bf6b1340_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2579596aca7169d46c141cc5bf6b1340_JaffaCakes118
-
Size
84KB
-
MD5
2579596aca7169d46c141cc5bf6b1340
-
SHA1
952b3d81c4c3534ed47b3dbe021189107ab554bd
-
SHA256
6fe5c87461f3c1ff5df67cb95846324b1ec92dc6890b878636316cb6cbba7b48
-
SHA512
a96e46bb0a9ec0abff2150af543b954cd10252ff711e3bd663ec286e1f9c346a7d07df3695bb8d01f1b78a99690c66b427653fbda672f2b95b0defecdf409f09
-
SSDEEP
768:G1fli2AHk0CUwnayRrfli2w+0p+tPOhKby:G1flVAHkPtjFflVwiiO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2579596aca7169d46c141cc5bf6b1340_JaffaCakes118
Files
-
2579596aca7169d46c141cc5bf6b1340_JaffaCakes118.exe windows:4 windows x86 arch:x86
729ac8a35a410c50be8fd1fc20ef75a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dbnmpntw
ConnectionClose
ConnectionError
ConnectionRead
ConnectionVer
wtsapi32
WTSFreeMemory
WTSLogoffSession
WTSSetSessionInformationA
WTSOpenServerA
WTSVirtualChannelRead
WTSVirtualChannelOpen
WTSVirtualChannelQuery
WTSQuerySessionInformationA
WTSQueryUserToken
WTSWaitSystemEvent
WTSEnumerateServersA
WTSVirtualChannelWrite
WTSUnRegisterSessionNotification
WTSVirtualChannelClose
crypt32
CertCreateContext
CertGetNameStringA
CertCloseStore
CertCompareCertificate
CertSaveStore
CryptEncodeObject
CertFindExtension
CertAlgIdToOID
CertFindChainInStore
CertOpenStore
CertControlStore
CertFindAttribute
CryptFindOIDInfo
CertDuplicateCRLContext
CertFreeCRLContext
kernel32
GetTimeFormatA
GetComputerNameA
CompareStringW
SleepEx
SetEnvironmentVariableA
WriteProcessMemory
InterlockedExchange
GetEnvironmentVariableA
WriteFile
CreateMutexA
FoldStringW
GetCurrentDirectoryA
QueryDosDeviceA
CreateSemaphoreW
GetDateFormatW
GetNumberFormatA
InterlockedDecrement
FindResourceExA
CopyFileA
GetCurrentProcess
CreateNamedPipeW
CreateDirectoryA
LoadLibraryA
CreateEventA
GetConsoleAliasW
GetPrivateProfileIntA
GetCurrentThreadId
GetDiskFreeSpaceA
HeapCreate
upnphost
DllGetClassObject
DllRegisterServer
ServiceMain
DllUnregisterServer
DllCanUnloadNow
user32
CharToOemA
LoadCursorA
GetCaretPos
GetWindowLongA
IsWindow
CreateWindowExW
LoadImageW
PostMessageA
DialogBoxParamW
IsZoomed
GetWindowTextA
shlwapi
UrlGetPartA
UrlIsOpaqueA
PathCombineA
PathCompactPathA
PathCommonPrefixA
UrlGetLocationA
UrlIsA
UrlCreateFromPathA
UrlEscapeA
UrlIsNoHistoryA
UrlCompareA
UrlCanonicalizeA
UrlUnescapeA
UrlHashA
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ