s:\sdcore\trayapp\regrepair\release\hpqrrx08.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5202ba61a11490a3592de128ea033560.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5202ba61a11490a3592de128ea033560
-
Size
152KB
-
MD5
5202ba61a11490a3592de128ea033560
-
SHA1
456ffe2dd955cbbfa38131048c7f08bc3faaf53d
-
SHA256
33fa7953662bd1cfe54fc89a6f3c9dc7a649cdee18fe0167d856be89fd2f2cf0
-
SHA512
0bfd8b8a36c8821dc19f807767f38b72ca81c851c91074c9f774c76d116c926e7348e0e82bdb4ddd5b69ee4a80537668b59dbb4e650d3dc45ee24ca0d28b49ab
-
SSDEEP
3072:fP5DzORW4pB39QajjcYh+2gW/0bxYenbMKv:fPJzORW4pdy0QYhFVmMo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_5202ba61a11490a3592de128ea033560
Files
-
JaffaCakes118_5202ba61a11490a3592de128ea033560.exe windows:4 windows x86 arch:x86
cf5def4b37074bc33b218678d7ddb506
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
SetFilePointer
WriteFile
CloseHandle
OutputDebugStringA
SetErrorMode
LocalAlloc
LoadLibraryA
GetLastError
FormatMessageA
GetProcAddress
FreeLibrary
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
lstrcmpiA
CreateDirectoryA
GetFileAttributesA
GetShortPathNameA
LocalUnlock
lstrcpyA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
lstrlenA
LocalLock
LocalFree
user32
SendMessageA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
RegisterClassExA
LoadCursorA
LoadIconA
PostQuitMessage
EndPaint
BeginPaint
SetWindowPos
MapWindowPoints
GetWindowRect
GetDlgItem
PostMessageA
GetClientRect
DefWindowProcA
DestroyWindow
DialogBoxParamA
EndDialog
UpdateWindow
ShowWindow
CreateWindowExA
advapi32
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
shell32
SHGetFolderPathA
ole32
StringFromGUID2
oleaut32
SysAllocString
SysFreeString
SysStringLen
VarBstrCat
SysAllocStringLen
msvcr80
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
_invoke_watson
_controlfp_s
_CxxThrowException
_decode_pointer
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__CxxFrameHandler3
_crt_debugger_hook
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
??3@YAXPAX@Z
strcat_s
strcpy_s
_chdrive
toupper
sprintf_s
_errno
_chdir
_getcwd
_mbstok_s
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE