E:\Programmierstuff\infbot\Release\infbot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f860137c18fef99d590f938f35d50668_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f860137c18fef99d590f938f35d50668_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f860137c18fef99d590f938f35d50668_JaffaCakes118
-
Size
179KB
-
MD5
f860137c18fef99d590f938f35d50668
-
SHA1
9d2f5d22892c171227614030b5a0bfadb4adce3c
-
SHA256
b67dfa9dedd522ce0a79d584c23dee82e6016f74810eb62dbe5535857e199dc1
-
SHA512
1d028109a117fc105c61e81115e174191849bf26e7a85a9705fe6c86a34d629eeefb00e6b9b928a8bc0d3cbe1168ddcf5911a5c44bd39816c8541eb4ce2c3f11
-
SSDEEP
3072:6/FKc4+8pEdpWbfopunewgxBZk4+zS1lVMWY:US+8gpWbfmf/noSVV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f860137c18fef99d590f938f35d50668_JaffaCakes118
Files
-
f860137c18fef99d590f938f35d50668_JaffaCakes118.exe windows:6 windows x86 arch:x86
fa2caf087c4b0cf288cabebaddb1e666
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CopyFileA
GetModuleFileNameA
GetCurrentProcess
Sleep
FreeConsole
SetConsoleTitleA
GetLastError
WritePrivateProfileStringA
CreateMutexA
TerminateProcess
FatalExit
CloseHandle
CheckRemoteDebuggerPresent
GetPrivateProfileStringA
InitializeCriticalSectionEx
CreateFileW
WriteConsoleW
GetVersionExA
GetSystemInfo
GlobalMemoryStatusEx
GetLocaleInfoA
IsDebuggerPresent
GetComputerNameA
SetStdHandle
ReadConsoleW
ReadFile
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
EnumSystemLocalesEx
IsValidLocaleName
LCMapStringEx
GetUserDefaultLocaleName
GetLocaleInfoEx
EncodePointer
DecodePointer
HeapFree
CreateThread
GetCurrentThreadId
ExitThread
GetProcAddress
LoadLibraryExW
IsProcessorFeaturePresent
GetCommandLineA
InterlockedDecrement
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
HeapSize
GetStdHandle
WriteFile
GetModuleFileNameW
HeapAlloc
RaiseException
GetProcessHeap
SetLastError
InterlockedIncrement
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetStartupInfoW
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InitOnceExecuteOnce
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
RtlUnwind
OutputDebugStringW
LoadLibraryW
user32
MessageBoxA
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyA
GetUserNameA
RegQueryValueExA
shell32
ShellExecuteA
SHGetFolderPathA
ws2_32
recv
closesocket
send
htons
inet_addr
WSAStartup
connect
socket
urlmon
URLDownloadToFileA
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ