Y:\Mars\Release\USBExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f45b2c4f52b333c26c4f40afd0c9c457_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f45b2c4f52b333c26c4f40afd0c9c457_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f45b2c4f52b333c26c4f40afd0c9c457_JaffaCakes118
-
Size
1.2MB
-
MD5
f45b2c4f52b333c26c4f40afd0c9c457
-
SHA1
2df62962749f7553d7c0d2cf180f8aa9900415cc
-
SHA256
c39128b25eef0d0d4797a70b22c49baa91660d1e933884b03f3a82426cba4b58
-
SHA512
585e46478700b37ee26aed1f9ca358586fca5f04442daa282f1e1b34dd7ab425138f0cb6562d10bbbf79d7b20de7900f5a2361ae0d10e1a5483cc915ab07a315
-
SSDEEP
24576:N8WnnnERpWkOWyYmtwXEr2YKy4BEuf66yST0yAYmNdpsh4h+wQYW:N8WnnnEjIK7kW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f45b2c4f52b333c26c4f40afd0c9c457_JaffaCakes118
Files
-
f45b2c4f52b333c26c4f40afd0c9c457_JaffaCakes118.exe windows:5 windows x86 arch:x86
db9bdf8c7d60a25ee8cbbbbd0ecdd54c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
GetCurrentProcess
GetStdHandle
SetErrorMode
Sleep
GetTempPathA
lstrcmpiA
lstrcpyA
GetSystemTime
SetFileAttributesA
lstrcatA
CopyFileA
TerminateThread
ResumeThread
GetCurrentThreadId
CreateThread
GetModuleFileNameA
OpenMutexA
OpenProcess
GetModuleHandleA
CreateRemoteThread
CreateToolhelp32Snapshot
Thread32First
OpenThread
WaitForSingleObjectEx
Thread32Next
Process32First
Process32Next
GetTickCount
DeleteFileA
VirtualAlloc
VirtualFree
FindResourceA
SizeofResource
LoadResource
WriteFile
FreeLibrary
lstrlenA
GetVersionExA
GetFileAttributesA
GetModuleFileNameW
lstrcpynW
lstrcatW
CreateDirectoryW
SetFileAttributesW
MoveFileExW
DeleteFileW
GetShortPathNameW
GetEnvironmentVariableW
lstrcpyW
SetPriorityClass
SetThreadPriority
GetCurrentThread
GetDriveTypeA
GetLastError
SetFilePointer
CreateFileW
WriteConsoleW
LoadLibraryW
HeapReAlloc
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
SetEndOfFile
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
CreateDirectoryA
CreateProcessA
UnmapViewOfFile
IsBadReadPtr
MapViewOfFile
CloseHandle
CreateFileMappingA
CreateFileA
HeapFree
VirtualAllocEx
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
LockResource
ReadProcessMemory
FreeEnvironmentStringsW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FlushFileBuffers
ReadFile
GetConsoleMode
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
ExitProcess
HeapCreate
IsProcessorFeaturePresent
SetHandleCount
GetConsoleCP
user32
SendMessageA
MessageBoxA
ShowWindow
PostThreadMessageA
DefWindowProcA
PostQuitMessage
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
GetMessageA
advapi32
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptReleaseContext
CryptAcquireContextA
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
CryptDestroyHash
shell32
ShellExecuteA
SHCreateDirectoryExA
ShellExecuteExW
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ