f:\SecurityProg\kgg\ManualMap\O2kSmall\Bin\Main.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f8ca2a330acb57a1313d00db575a8e16_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8ca2a330acb57a1313d00db575a8e16_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8ca2a330acb57a1313d00db575a8e16_JaffaCakes118
-
Size
154KB
-
MD5
f8ca2a330acb57a1313d00db575a8e16
-
SHA1
b929950dca282c343324974588100bcd9b5ef36e
-
SHA256
c37a81359b594703c1aafa7a4ec03b677e92393b4493a1ab302e260f9e55623c
-
SHA512
48bc78dd994d76d1c97fd2b4719de416d9bd49fd40efefeded5e0f16b659fc0613e8044be6cce924a40e0e9964613692ef6ad46a8222045e84ca07a15a3bccc0
-
SSDEEP
3072:iw9W7WXu9q5ByQXA/S2xJvZMSCw83mrKhkc2hh5qas7:iwpkZJvZMSp8YhOP7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8ca2a330acb57a1313d00db575a8e16_JaffaCakes118
Files
-
f8ca2a330acb57a1313d00db575a8e16_JaffaCakes118.exe windows:5 windows x86 arch:x86
e51c0a581cb7772a057ea58cedabea84
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
WSAStartup
inet_ntoa
gethostbyname
WSACleanup
gethostname
kernel32
LoadLibraryA
GetSystemDirectoryA
CloseHandle
CreateFileA
GetFileSize
GetCurrentProcess
GetLastError
CopyFileA
SetEndOfFile
WriteFile
ReadFile
SetFilePointer
SetFileAttributesA
GetTempFileNameA
Sleep
GetSystemTime
GetModuleHandleA
GetModuleFileNameA
GetTempPathA
ExitProcess
CreateMutexA
Process32Next
Process32First
CreateToolhelp32Snapshot
SizeofResource
LockResource
GetProcAddress
FindResourceA
FileTimeToSystemTime
GetFileInformationByHandle
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
SystemTimeToFileTime
GetLocalTime
GetTickCount
lstrlenA
GetProcessHeap
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetVersionExA
GetSystemInfo
HeapReAlloc
GetStringTypeA
GetStringTypeW
MultiByteToWideChar
LoadResource
FlushFileBuffers
SetStdHandle
VirtualAlloc
GetConsoleMode
GetLocaleInfoA
RtlUnwind
DeleteFileA
GetConsoleCP
RaiseException
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
WideCharToMultiByte
LCMapStringW
HeapFree
EnterCriticalSection
LeaveCriticalSection
HeapSize
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
GetKeyState
GetWindowThreadProcessId
GetForegroundWindow
GetDesktopWindow
MessageBoxA
SetWindowsHookExA
SetTimer
GetMessageA
DispatchMessageA
GetKeyboardLayout
MapVirtualKeyExA
GetKeyboardState
ToUnicodeEx
CallNextHookEx
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
ole32
CoInitialize
CoCreateInstance
oleaut32
VariantClear
SysAllocString
shlwapi
StrStrIA
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ