C:\liji.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f31cde8973df6ea521b90fdf8227374e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f31cde8973df6ea521b90fdf8227374e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f31cde8973df6ea521b90fdf8227374e_JaffaCakes118
-
Size
13.0MB
-
MD5
f31cde8973df6ea521b90fdf8227374e
-
SHA1
8bf7046fa636123c79e9e333f11c676364d038d0
-
SHA256
bbc6f4150ca247ebe2375c8c2041830d73a2c3c09df021f2c69c5ba16b4912b8
-
SHA512
1f20e1a8bc4914f9f774748b7d2d639506dc5d7ffdc288eb3c7f77aa8df2671c4c968dcf55f47556bee8dbe0e19c6785e538c813e7669ddd85733f82034b92e6
-
SSDEEP
12288:awyc+f7Y47sgQhihFAXE6iPzp666666666666666666666666666666666666662:aw+f7VQhBW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f31cde8973df6ea521b90fdf8227374e_JaffaCakes118
Files
-
f31cde8973df6ea521b90fdf8227374e_JaffaCakes118.exe windows:5 windows x86 arch:x86
baa7acc629fae892f4f615c8c37bd06b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
WritePrivateProfileStructA
TlsGetValue
GetNumberOfConsoleInputEvents
MapUserPhysicalPages
InterlockedDecrement
SetEnvironmentVariableW
CreateDirectoryW
GetProfileSectionA
WaitForSingleObject
WriteConsoleInputA
SetComputerNameW
SetVolumeMountPointW
FreeEnvironmentStringsA
GetModuleHandleW
LocalFlags
GetConsoleTitleA
ReadConsoleW
GetWindowsDirectoryA
WriteFile
GetDriveTypeA
GlobalAlloc
AddRefActCtx
GetPrivateProfileStructW
SetSystemTimeAdjustment
GetVersionExW
GetComputerNameExA
Beep
VerifyVersionInfoA
GetBinaryTypeA
WritePrivateProfileSectionW
GetAtomNameW
FileTimeToSystemTime
GetModuleFileNameW
CompareStringW
HeapReAlloc
GlobalUnlock
LCMapStringA
VerifyVersionInfoW
InterlockedExchange
SetCurrentDirectoryA
GetLastError
GetProcAddress
CreateNamedPipeA
CopyFileA
SetStdHandle
GetTempFileNameA
GetPrivateProfileStringA
OpenWaitableTimerA
OpenMutexA
SetCalendarInfoW
IsSystemResumeAutomatic
SetConsoleOutputCP
AddAtomW
QueryDosDeviceW
GetCommMask
EnumResourceTypesW
GetThreadPriority
QueryMemoryResourceNotification
FindNextFileW
GetCurrentDirectoryA
CompareStringA
GetConsoleCursorInfo
ScrollConsoleScreenBufferA
OpenSemaphoreW
DeleteTimerQueueTimer
ReadConsoleOutputCharacterW
InterlockedPushEntrySList
GetVolumeInformationW
IsProcessorFeaturePresent
FlushFileBuffers
CloseHandle
CreateFileW
SetConsoleTitleA
FileTimeToDosDateTime
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteFileA
MultiByteToWideChar
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
GetFileType
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapValidate
IsBadReadPtr
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
RaiseException
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapCreate
WriteConsoleW
RtlUnwind
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
HeapAlloc
GetModuleFileNameA
HeapSize
HeapQueryInformation
HeapFree
GetStringTypeW
LCMapStringW
user32
GetMenuBarInfo
GetCursorInfo
GetComboBoxInfo
GetMenuInfo
advapi32
InitiateSystemShutdownA
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12.8MB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ