C:\xampp\htdocs\Cryptor\34dbbbe9ac0b43ad8a3faccc55016f65\Loader\pr2\Release\pr2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
company business card.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_1f353c80cb9caf0e679a2dde8eae3e1ad9a230d8f3068eeecc88c42db5679977
-
Size
348KB
-
MD5
7c5b7d29667dc931f9dee320efab927e
-
SHA1
b3d8317eb3ea29bdce0355be7af8bede2cfc6381
-
SHA256
1f353c80cb9caf0e679a2dde8eae3e1ad9a230d8f3068eeecc88c42db5679977
-
SHA512
59fd255ab2567c044c4e76c06a9b72d4bfa90e673e6ae80d9842536343c8a0d5dae5609914e54a88d7ec5e980349040688f82fb52cc7f5c74c26b12a78bd57c5
-
SSDEEP
6144:4bmKjS8aATKfHlhOsN2RAO4Q9RtxC8UOYdAJ+hzYGSIqJ3152U:gmoS83TKf3RglrO82AqMGelV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/company business card.exe
Files
-
JaffaCakes118_1f353c80cb9caf0e679a2dde8eae3e1ad9a230d8f3068eeecc88c42db5679977.zip
Password: infected
-
07926506456f369c01ba34b6f3a55b05cbb27e503f37a9fd8890f8d002173d59.zip
-
company business card.exe.exe windows:6 windows x86 arch:x86
97750a00050e37c7b56da7bc3864f0f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dbghelp
MiniDumpWriteDump
kernel32
CreateFileW
GetFileSize
ReadFile
SetFilePointer
WriteFile
CloseHandle
GetCurrentProcess
GetCurrentProcessId
VirtualProtect
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetConsoleCtrlHandler
GetProcessHeap
LCMapStringW
DecodePointer
GetTimeFormatW
GetDateFormatW
OutputDebugStringW
OutputDebugStringA
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
CompareStringW
SetLastError
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
TerminateProcess
RaiseException
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetLastError
WriteConsoleW
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
GetCurrentThread
GetFileType
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
user32
LoadIconW
LoadCursorW
GetWindowLongW
MessageBeep
MessageBoxW
GetWindowTextW
SetWindowTextW
EndPaint
BeginPaint
GetDC
UpdateWindow
GrayStringA
TranslateAcceleratorW
LoadAcceleratorsW
SendDlgItemMessageW
GetDlgItem
EndDialog
DialogBoxParamW
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassExW
PostQuitMessage
DefWindowProcW
SendMessageW
DispatchMessageW
TranslateMessage
GetMessageW
LoadStringW
comdlg32
GetOpenFileNameW
Sections
.text Size: 257KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ