D:\Projects\repos\ScarePopup\Release\Win10Helper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f805495318274a3f8ebec87621afc97e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f805495318274a3f8ebec87621afc97e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f805495318274a3f8ebec87621afc97e_JaffaCakes118
-
Size
1.4MB
-
MD5
f805495318274a3f8ebec87621afc97e
-
SHA1
97c249b05488dafd3e3fdb9965319c43f6528046
-
SHA256
29d48a9b4c7a611842613e0a51cf355ad8ecd60c0c4286845e4952938cc7b0a4
-
SHA512
da22fb3a4862a453bda3c62dca50275bd4c282efe6706d9e095fe8dcc429190094896cc88e231de9cbf1bb01ba2376cf43b93f6509adce5bf03292108b996156
-
SSDEEP
24576:6cx8SiIFqbBuRGVTNc6U9Cmkl4KQon8G9w5RBVrLxOYHy1tjn2:6cXiIFqbBVTNc6UAmkl6ex9gogy1Rn2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f805495318274a3f8ebec87621afc97e_JaffaCakes118
Files
-
f805495318274a3f8ebec87621afc97e_JaffaCakes118.exe windows:6 windows x86 arch:x86
bfba49875d5cfa1116182274c9d62bac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
GetCommandLineW
FindClose
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
HeapSize
CreateFileW
GetLastError
GetModuleHandleW
FindFirstFileExW
Sleep
GetFileSizeEx
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileType
HeapFree
HeapAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
WriteFile
GetStdHandle
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetTimeZoneInformation
WriteConsoleW
user32
PostQuitMessage
LoadCursorW
LoadIconW
TranslateMessage
PeekMessageW
DispatchMessageW
ShowWindow
RegisterClassExW
GetSystemMetrics
CreateWindowExW
SetActiveWindow
DefWindowProcW
d3d9
Direct3DCreate9
d3dx9_43
D3DXCreateSprite
D3DXCreateTextureFromFileInMemory
D3DXMatrixTransformation2D
winmm
PlaySoundA
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ