D:\Bld\nTune6.1\sys_bios\tools\wpt\nTuneService\Release\nTuneService.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2c13aaa55ebf4838104a8c6b0a437348_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c13aaa55ebf4838104a8c6b0a437348_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2c13aaa55ebf4838104a8c6b0a437348_JaffaCakes118
-
Size
152KB
-
MD5
2c13aaa55ebf4838104a8c6b0a437348
-
SHA1
1b3cc4729435f3104a71c53bd354c4c1d32db462
-
SHA256
6a23df1f6c683eb363c88272a27cabc904475509f68b71cfbc10de5edca3092f
-
SHA512
a7c35f7d0cd8c06f3c6ab3dc214307dc6fa4d51c0ed3402ddb1e1bbc8f1420b2aa3458c7ff7244a5e3ee973baa075f4362e609581c169cb28eaa43eb176e9571
-
SSDEEP
1536:E4QmONqxP+LXsEs8Khlv3hOv404hIaRoJrig6kW6sZ6t51am:Qp4N+LfJYpwt1aRoJri5kWbYT1D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c13aaa55ebf4838104a8c6b0a437348_JaffaCakes118
Files
-
2c13aaa55ebf4838104a8c6b0a437348_JaffaCakes118.exe windows:4 windows x86 arch:x86
1b6df80799a2cb4bc544586ceece4d05
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wtsapi32
WTSSendMessageA
WTSQueryUserToken
hid
HidD_GetIndexedString
HidD_GetProductString
HidP_GetLinkCollectionNodes
HidP_GetCaps
HidD_GetPreparsedData
HidD_GetHidGuid
HidP_GetSpecificValueCaps
HidD_FreePreparsedData
HidP_GetUsageValue
HidP_GetScaledUsageValue
HidD_GetInputReport
HidD_SetOutputReport
HidP_SetUsageValue
HidD_GetFeature
HidD_GetAttributes
HidD_SetNumInputBuffers
HidD_GetManufacturerString
setupapi
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
mfc71
ord2394
ord2413
ord2408
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord2410
ord1599
ord5200
ord2862
ord4486
ord4262
ord3182
ord354
ord1123
ord4353
ord1482
ord1084
ord2371
ord1903
ord1063
ord2168
ord3934
ord4035
ord4749
ord709
ord501
ord3389
ord2131
ord5529
ord2271
ord297
ord1489
ord6118
ord299
ord2933
ord2469
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord1551
ord1670
ord1671
ord4580
ord4890
ord4735
ord4212
ord5182
ord3641
ord3830
ord1122
ord1054
ord2020
ord605
ord757
ord566
ord3333
ord4261
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord3683
ord4541
ord2322
ord907
ord304
ord911
ord4081
ord310
ord784
ord2272
ord3997
ord2902
ord5563
ord781
ord578
ord876
ord5715
ord5716
ord745
ord557
ord1024
ord1115
ord762
ord6286
ord5320
ord6297
ord5331
ord3255
ord266
ord265
ord1185
ord764
ord912
ord1655
ord1207
msvcr71
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
?terminate@@YAXXZ
_onexit
__dllonexit
__security_error_handler
memset
_except_handler3
ftell
fseek
_time64
_localtime64
strrchr
strncpy
isspace
_mbsnbicmp
fgets
fputs
atof
mbstowcs
strtok
atoi
vfprintf
fread
fopen
fclose
__CxxFrameHandler
sprintf
sscanf
malloc
free
_stricmp
_setmbcp
_controlfp
kernel32
CopyFileA
GetExitCodeThread
GetVersionExA
OpenProcess
WTSGetActiveConsoleSessionId
DisconnectNamedPipe
GetUserGeoID
GetGeoInfoA
GetLocaleInfoA
lstrcmpiA
lstrcatA
lstrcpyA
CreateFileA
FlushFileBuffers
GetLastError
CreateEventA
LoadLibraryA
ResetEvent
Sleep
WaitForSingleObject
FreeLibrary
CloseHandle
GetPrivateProfileIntA
GetPrivateProfileStringA
GlobalMemoryStatus
CreateNamedPipeA
ExitProcess
GetStartupInfoA
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
ReadFile
ConnectNamedPipe
CreateThread
Beep
lstrcmpA
CreateMutexA
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
WritePrivateProfileSectionA
WritePrivateProfileStringA
DeleteFileA
GetCommandLineA
GetCurrentProcess
GetModuleHandleA
GetModuleFileNameA
SetEvent
OpenEventA
QueryPerformanceCounter
GetProcAddress
GetUserDefaultUILanguage
user32
AppendMenuA
DrawIcon
SystemParametersInfoA
GetSystemMetrics
SendMessageA
CharUpperA
wsprintfA
GetSystemMenu
IsIconic
GetClientRect
EnableWindow
LoadStringA
LoadIconA
advapi32
RegCreateKeyA
SetSecurityDescriptorDacl
RegisterServiceCtrlHandlerExA
CreateProcessAsUserA
SetSecurityInfo
DeleteService
ControlService
OpenServiceA
StartServiceA
CreateServiceA
SetServiceStatus
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
CloseServiceHandle
OpenSCManagerA
StartServiceCtrlDispatcherA
RegCreateKeyExA
InitializeSecurityDescriptor
shell32
SHGetFolderPathA
SHCreateDirectoryExA
comctl32
ord17
shlwapi
PathFileExistsA
PathAppendA
ws2_32
WSAStartup
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE