klipopga.pdb
Static task
static1
Behavioral task
behavioral1
Sample
41d570392ec89036cadef5b2f2755150_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41d570392ec89036cadef5b2f2755150_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41d570392ec89036cadef5b2f2755150_JaffaCakes118
-
Size
92KB
-
MD5
41d570392ec89036cadef5b2f2755150
-
SHA1
1634b20400174dfb8c41e83b17cd24faf3385b35
-
SHA256
73bbc576c9c638ae9b8cd0f45f4fc03c868298b019ce260ecf2e9ad3c9fe42a5
-
SHA512
eef7a1ff6dd93db4068c3d0962b6957963227cbb38c0c7b3f0f0d266b83d08b9f2286f0ae08de608cd86be361552ac6d860afffa95500b2b24ede26819a3b96b
-
SSDEEP
768:VI1flzG7fqQbzr/HNkHflS+0p+tPOhKby:VI1flzhQ3r/HNkHflSiiO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41d570392ec89036cadef5b2f2755150_JaffaCakes118
Files
-
41d570392ec89036cadef5b2f2755150_JaffaCakes118.exe windows:4 windows x86 arch:x86
729ac8a35a410c50be8fd1fc20ef75a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dbnmpntw
ConnectionClose
ConnectionError
ConnectionRead
ConnectionVer
wtsapi32
WTSFreeMemory
WTSLogoffSession
WTSSetSessionInformationA
WTSOpenServerA
WTSVirtualChannelRead
WTSVirtualChannelOpen
WTSVirtualChannelQuery
WTSQuerySessionInformationA
WTSQueryUserToken
WTSWaitSystemEvent
WTSEnumerateServersA
WTSVirtualChannelWrite
WTSUnRegisterSessionNotification
WTSVirtualChannelClose
crypt32
CertCreateContext
CertGetNameStringA
CertCloseStore
CertCompareCertificate
CertSaveStore
CryptEncodeObject
CertFindExtension
CertAlgIdToOID
CertFindChainInStore
CertOpenStore
CertControlStore
CertFindAttribute
CryptFindOIDInfo
CertDuplicateCRLContext
CertFreeCRLContext
kernel32
GetTimeFormatA
GetComputerNameA
CompareStringW
SleepEx
SetEnvironmentVariableA
WriteProcessMemory
InterlockedExchange
GetEnvironmentVariableA
WriteFile
CreateMutexA
FoldStringW
GetCurrentDirectoryA
QueryDosDeviceA
CreateSemaphoreW
GetDateFormatW
GetNumberFormatA
InterlockedDecrement
FindResourceExA
CopyFileA
GetCurrentProcess
CreateNamedPipeW
CreateDirectoryA
LoadLibraryA
CreateEventA
GetConsoleAliasW
GetPrivateProfileIntA
GetCurrentThreadId
GetDiskFreeSpaceA
HeapCreate
upnphost
DllGetClassObject
DllRegisterServer
ServiceMain
DllUnregisterServer
DllCanUnloadNow
user32
CharToOemA
LoadCursorA
GetCaretPos
GetWindowLongA
IsWindow
CreateWindowExW
LoadImageW
PostMessageA
DialogBoxParamW
IsZoomed
GetWindowTextA
shlwapi
UrlGetPartA
UrlIsOpaqueA
PathCombineA
PathCompactPathA
PathCommonPrefixA
UrlGetLocationA
UrlIsA
UrlCreateFromPathA
UrlEscapeA
UrlIsNoHistoryA
UrlCompareA
UrlCanonicalizeA
UrlUnescapeA
UrlHashA
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ