C:\1\code\Release\FORMAT1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f0b1d40c2f19222e6023cded6349f26c_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
f0b1d40c2f19222e6023cded6349f26c_JaffaCakes118
-
Size
428KB
-
MD5
f0b1d40c2f19222e6023cded6349f26c
-
SHA1
28520050ca43b81c6a7bf26cbe357219f026ee01
-
SHA256
342c6f896cfd65506ce1940e8c9902e47f2921830ca8085d1e2847fc7b7cb102
-
SHA512
d5680d5b0909489fd8df855fd30ddff80b44a02326d7b6e2b3306a1a747c9db9125449c0d0be1e34cb048ccdd2cccd6527361debf1384035df297e3b14d2bf8e
-
SSDEEP
12288:mkRf7Sd2ji/ZE0Ym16ejbeWzrTKjex+wb/m4R:TRfmG0YgKwrTKjext
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f0b1d40c2f19222e6023cded6349f26c_JaffaCakes118
Files
-
f0b1d40c2f19222e6023cded6349f26c_JaffaCakes118.exe windows:5 windows x86 arch:x86
f65017d8831ffbffdcc0a43ba69f6901
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetConsoleTextAttribute
Process32First
FormatMessageA
SizeofResource
GetConsoleWindow
SetConsoleTitleA
GetStdHandle
GetLastError
GetProcAddress
VirtualAlloc
Process32Next
LoadResource
LocalAlloc
LockResource
GetModuleHandleA
CreateToolhelp32Snapshot
LocalSize
CloseHandle
LocalFree
SetEndOfFile
CreateFileW
CreateFileA
WriteConsoleW
lstrlenA
lstrcmpA
GetConsoleScreenBufferInfo
FindResourceA
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
GetModuleHandleW
ExitProcess
FatalAppExitA
WriteFile
GetModuleFileNameW
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryW
SetStdHandle
GetProcessHeap
user32
MessageBoxIndirectA
MoveWindow
wsprintfA
iphlpapi
IcmpCloseHandle
IcmpCreateFile
IcmpSendEcho
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 246KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ