klipopga.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5725fdf8aac8b7bb5934d935070f8cc0_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5725fdf8aac8b7bb5934d935070f8cc0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5725fdf8aac8b7bb5934d935070f8cc0_JaffaCakes118
-
Size
84KB
-
MD5
5725fdf8aac8b7bb5934d935070f8cc0
-
SHA1
a262f708551297b08cd927619f82f1643849a563
-
SHA256
3dd843fbba185fb6c8be73682f39e266f5cd95c55e488741ae43a8a3ac5bc10c
-
SHA512
b895ada1693db908e68cd1bddfcd43c3113a6baa5b14f36c96e81395befd6dbcdb8dc805eeabce9a6b70ee86601f318beb2b31964653a48b782e46ace9a71024
-
SSDEEP
384:X81ftznbtVnlfQQlHmO6ww30xKMFMUftznbtVSziKZxtp2RdpSQXtP0PhKbv3K:s1flXnBQQYh2FMUflXS+0p+tPOhKby
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5725fdf8aac8b7bb5934d935070f8cc0_JaffaCakes118
Files
-
5725fdf8aac8b7bb5934d935070f8cc0_JaffaCakes118.exe windows:4 windows x86 arch:x86
729ac8a35a410c50be8fd1fc20ef75a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dbnmpntw
ConnectionClose
ConnectionError
ConnectionRead
ConnectionVer
wtsapi32
WTSFreeMemory
WTSLogoffSession
WTSSetSessionInformationA
WTSOpenServerA
WTSVirtualChannelRead
WTSVirtualChannelOpen
WTSVirtualChannelQuery
WTSQuerySessionInformationA
WTSQueryUserToken
WTSWaitSystemEvent
WTSEnumerateServersA
WTSVirtualChannelWrite
WTSUnRegisterSessionNotification
WTSVirtualChannelClose
crypt32
CertCreateContext
CertGetNameStringA
CertCloseStore
CertCompareCertificate
CertSaveStore
CryptEncodeObject
CertFindExtension
CertAlgIdToOID
CertFindChainInStore
CertOpenStore
CertControlStore
CertFindAttribute
CryptFindOIDInfo
CertDuplicateCRLContext
CertFreeCRLContext
kernel32
GetTimeFormatA
GetComputerNameA
CompareStringW
SleepEx
SetEnvironmentVariableA
WriteProcessMemory
InterlockedExchange
GetEnvironmentVariableA
WriteFile
CreateMutexA
FoldStringW
GetCurrentDirectoryA
QueryDosDeviceA
CreateSemaphoreW
GetDateFormatW
GetNumberFormatA
InterlockedDecrement
FindResourceExA
CopyFileA
GetCurrentProcess
CreateNamedPipeW
CreateDirectoryA
LoadLibraryA
CreateEventA
GetConsoleAliasW
GetPrivateProfileIntA
GetCurrentThreadId
GetDiskFreeSpaceA
HeapCreate
upnphost
DllGetClassObject
DllRegisterServer
ServiceMain
DllUnregisterServer
DllCanUnloadNow
user32
CharToOemA
LoadCursorA
GetCaretPos
GetWindowLongA
IsWindow
CreateWindowExW
LoadImageW
PostMessageA
DialogBoxParamW
IsZoomed
GetWindowTextA
shlwapi
UrlGetPartA
UrlIsOpaqueA
PathCombineA
PathCompactPathA
PathCommonPrefixA
UrlGetLocationA
UrlIsA
UrlCreateFromPathA
UrlEscapeA
UrlIsNoHistoryA
UrlCompareA
UrlCanonicalizeA
UrlUnescapeA
UrlHashA
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ