C:\togoc58_jizoxituzomo54\yajev_memoyexidobemo\rec-nuvoladoli.pdb
Static task
static1
Behavioral task
behavioral1
Sample
proxychain.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_80ae0bbcd756599996cfabd5f7beb404be8842fdbbbd03a9682966077f5c48b9
-
Size
145KB
-
MD5
6be70b0961c690ad25a52122f7f51b88
-
SHA1
970dd9624c4e60226adc46e5f90cb986645e5869
-
SHA256
80ae0bbcd756599996cfabd5f7beb404be8842fdbbbd03a9682966077f5c48b9
-
SHA512
2eeecd452461b6a682a9aae99c21625fc1fbabffece41ae14c664508987fc771b8a48a07eb024e3143e2c63879adb30efaeb55624fdc13138a44bfe41b741567
-
SSDEEP
3072:VgJtFwI5lmQFEgosLLXLD2feDxbhvq805+VehAqs/0mcddagl:OwI/mQFnWfwVhvzh0hA1/0mcd8e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/proxychain.bin
Files
-
JaffaCakes118_80ae0bbcd756599996cfabd5f7beb404be8842fdbbbd03a9682966077f5c48b9.zip
Password: infected
-
proxychain.bin.exe windows:5 windows x86 arch:x86
40e5c5c7408818462da1afadba1094c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
GetPrivateProfileIntA
SetLocaleInfoA
FindNextVolumeW
GetNamedPipeHandleStateW
LocalFileTimeToFileTime
EnumResourceTypesA
EnumResourceNamesW
FillConsoleOutputCharacterA
GetTimeZoneInformation
TerminateProcess
SetEvent
FindNextFileA
GetCompressedFileSizeA
CopyFileExW
BuildCommDCBW
VerifyVersionInfoA
FreeResource
SetLastError
GetVersionExW
ReadConsoleOutputCharacterA
SetDefaultCommConfigW
VerLanguageNameA
GetCommConfig
WritePrivateProfileStructW
FreeEnvironmentStringsA
CreateTimerQueue
FindNextVolumeMountPointA
ResetWriteWatch
WriteConsoleInputA
SetComputerNameExA
AddAtomW
InitAtomTable
GetThreadPriority
CallNamedPipeA
GetDriveTypeW
BuildCommDCBAndTimeoutsW
VirtualProtect
LoadLibraryW
GlobalAlloc
VerifyVersionInfoW
InterlockedExchange
FindFirstChangeNotificationA
SearchPathW
FormatMessageA
SetDllDirectoryW
GetModuleHandleA
WritePrivateProfileStringA
GetUserDefaultLCID
TerminateThread
GlobalUnfix
GetStartupInfoW
GetSystemWow64DirectoryW
CopyFileA
SetCalendarInfoW
GetLastError
DebugBreak
SetConsoleCursorInfo
FreeLibraryAndExitThread
GetModuleFileNameA
GetConsoleAliasExesLengthA
SetConsoleScreenBufferSize
WaitForDebugEvent
InterlockedExchangeAdd
GetOEMCP
GetPrivateProfileStringW
CreateActCtxA
GetPrivateProfileIntW
ReadConsoleInputW
OutputDebugStringW
EnumResourceTypesW
lstrlenA
WriteConsoleW
OpenMutexW
GetThreadContext
DeleteCriticalSection
ConvertFiberToThread
FreeEnvironmentStringsW
SetProcessPriorityBoost
LockFile
GetConsoleCP
CreateIoCompletionPort
AllocConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasExesLengthW
CreateMailslotW
GetCommState
MoveFileWithProgressW
GetSystemTimeAdjustment
EnumSystemLocalesA
SetFileApisToANSI
OpenWaitableTimerW
OpenFileMappingW
GetFileSizeEx
GetConsoleAliasesLengthW
GetProcessShutdownParameters
WriteConsoleOutputCharacterA
GetConsoleAliasExesA
GetBinaryTypeW
GetNumberFormatA
GetModuleHandleW
Sleep
InterlockedIncrement
InterlockedDecrement
GetProcAddress
ExitProcess
MoveFileA
DeleteFileA
RaiseException
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
WriteFile
GetStdHandle
GetACP
GetCPInfo
IsValidCodePage
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
OutputDebugStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
CharToOemBuffW
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ