c:\Cryptor\Stub4\Release\STUB4.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f160e470de6ef1178cd296a91a1f68ef_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f160e470de6ef1178cd296a91a1f68ef_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f160e470de6ef1178cd296a91a1f68ef_JaffaCakes118
-
Size
179KB
-
MD5
f160e470de6ef1178cd296a91a1f68ef
-
SHA1
907087e391f3a15d44733de2874d8f2562aa1c96
-
SHA256
2e581862f63effaa506a6accdf76e85dd135955137bb5350d32a470ada0b5038
-
SHA512
ca483fa876abc3734d688457e636394daf22d823ef20bdb22134c2fcabd17bc3cbfc6c6034778431ce463838d2d4d7f0bf7d8f1ef2b536e872b4188f39ac1898
-
SSDEEP
3072:XwCHql0p4gSCAJFPZNUZgQaAcuBFE6uvv:gQnp32JFsR2m2v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f160e470de6ef1178cd296a91a1f68ef_JaffaCakes118
Files
-
f160e470de6ef1178cd296a91a1f68ef_JaffaCakes118.exe windows:4 windows x86 arch:x86
60a1edd204105174aabe3076f0072c42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
ReadFile
SetFilePointer
WriteFile
CloseHandle
GetFileSize
GlobalAlloc
GetModuleHandleA
VirtualAllocEx
VirtualProtectEx
GetThreadContext
CreateProcessA
GetTickCount
Sleep
GetSystemTime
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
InterlockedIncrement
CreateThread
ExitProcess
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
SetEndOfFile
HeapSize
GetCPInfo
GetOEMCP
GetACP
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
GetLastError
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
TerminateProcess
GetCurrentProcess
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
RtlUnwind
InterlockedExchange
VirtualQuery
GetSystemInfo
user32
EnumWindows
GetWindowTextA
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ