I:\workspace\AutoRenewUrl\Src\FullRelease\SafeLoad.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f8e9af61dfb075efa17789220c4e8a55_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f8e9af61dfb075efa17789220c4e8a55_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8e9af61dfb075efa17789220c4e8a55_JaffaCakes118
-
Size
507KB
-
MD5
f8e9af61dfb075efa17789220c4e8a55
-
SHA1
1be320aad714ab95fe2a289fe269e510f2245f72
-
SHA256
c2a657b6815247bd34ae2f0b99ca23ad9007c30bc01874a7b543d09704b72a22
-
SHA512
bf4e693f8e72c6f0f2ca11cdfb9de453d823ec3e981dc847d84fbff72b7df3971663cae21139a69121118f5c17b3962b135d1b3b999b0d7787a782eebfc01978
-
SSDEEP
12288:4BUpljciJkVlQpPVTuTsCGzF1m7/ocQ4n+I4h/MX2MVXxU3YRPiy:4OljT4n+I4tl8qy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8e9af61dfb075efa17789220c4e8a55_JaffaCakes118
Files
-
f8e9af61dfb075efa17789220c4e8a55_JaffaCakes118.exe windows:5 windows x86 arch:x86
d6b3f0ab254ebe2c4e37a71b10665445
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wldap32
ord60
ord211
ord46
ord143
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ord50
ws2_32
setsockopt
ntohs
htons
getsockopt
getsockname
socket
connect
closesocket
bind
send
recv
WSASetLastError
select
__WSAFDIsSet
WSAGetLastError
WSACleanup
WSAStartup
WSAIoctl
getaddrinfo
freeaddrinfo
accept
listen
recvfrom
sendto
ioctlsocket
gethostname
htonl
ntohl
getpeername
crypt32
CertFreeCertificateContext
kernel32
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
FindClose
SetStdHandle
FlushFileBuffers
GetConsoleCP
ReadConsoleW
GetConsoleMode
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleFileNameW
GetProcessHeap
GetCPInfo
FreeLibrary
MultiByteToWideChar
GetProcAddress
CompareStringW
Sleep
GetModuleFileNameA
GetModuleHandleW
LoadLibraryW
ReadFile
CreateFileW
CloseHandle
CreateFileA
GetNativeSystemInfo
WriteFile
WideCharToMultiByte
GetLastError
GetTempPathA
GetTickCount
SetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SleepEx
VerSetConditionMask
GetModuleHandleA
GetSystemDirectoryA
VerifyVersionInfoA
FormatMessageA
WaitForSingleObject
WaitForMultipleObjects
GetFileType
GetStdHandle
PeekNamedPipe
ExpandEnvironmentStringsA
LCMapStringW
GetStringTypeW
OutputDebugStringW
WriteConsoleW
GetTimeZoneInformation
SetEnvironmentVariableA
GetFullPathNameW
GetCurrentDirectoryW
SetEndOfFile
LoadLibraryA
GetOEMCP
GetACP
IsValidCodePage
HeapSize
AreFileApisANSI
GetModuleHandleExW
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
CreateThread
GetCurrentThreadId
ExitThread
LoadLibraryExW
GetCurrentProcessId
SetFilePointerEx
FileTimeToLocalFileTime
GetFileInformationByHandle
FileTimeToSystemTime
RaiseException
RtlUnwind
ExitProcess
advapi32
RegCloseKey
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
shell32
ShellExecuteA
ole32
CoInitialize
CoCreateGuid
CoUninitialize
Sections
.text Size: 340KB - Virtual size: 339KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ