E:\Desktop\AV\inceptor\inceptor\temp\beacon-temp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bc1a38c72e167437dd295d188dd1f672_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc1a38c72e167437dd295d188dd1f672_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
bc1a38c72e167437dd295d188dd1f672_JaffaCakes118
-
Size
528KB
-
MD5
bc1a38c72e167437dd295d188dd1f672
-
SHA1
20bd1b0590736d18e1ab78aac2685917f8d36b87
-
SHA256
0745de991eced58eb6c7614290db74326aab558f9362768ebdb2f1da4181f2d7
-
SHA512
1021bce7fb2fb743925082abfdf7d1199344b9152327892943b745e615f8c6f8948dfb8befe7d20c73ebe512693a58cf992598dee5d92e753f089d952cd56368
-
SSDEEP
6144:+Bzr1Rij0C3ztq/PdZ8v5ReLA60Lw748mTrjY7SuhkXnwjtc5USlM8aG:0HG0+z0PdOStaGV+Xnw59l8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource bc1a38c72e167437dd295d188dd1f672_JaffaCakes118
Files
-
bc1a38c72e167437dd295d188dd1f672_JaffaCakes118.exe windows:6 windows x64 arch:x64
bc0a3eec1215ebaa755e2aedded238e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
VirtualAlloc
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
vcruntime140
memcpy
__C_specific_handler
__std_type_info_destroy_list
__current_exception
__current_exception_context
memset
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
puts
__acrt_iob_func
_set_fmode
__p__commode
api-ms-win-crt-heap-l1-1-0
malloc
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_configure_narrow_argv
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_exit
_seh_filter_exe
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_set_app_type
terminate
_crt_at_quick_exit
_seh_filter_dll
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 205KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 315KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 337B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 471B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ