c:\test\new4\Release\TrojanSocks.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fb3cb4bc5fe12bc3fbfa90936a2de5d0_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fb3cb4bc5fe12bc3fbfa90936a2de5d0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fb3cb4bc5fe12bc3fbfa90936a2de5d0_JaffaCakes118
-
Size
125KB
-
MD5
fb3cb4bc5fe12bc3fbfa90936a2de5d0
-
SHA1
04d5022824b51beafd73eee732de718c7f291546
-
SHA256
410aa485858486c4415ff9cd1a7d6e7246375696be298cf1c90d6f204f64d3d8
-
SHA512
a2c9d5125d16f4005bffbfc8e8f482cbcec0061174a7f88a4f53b38d9a41ad20e8da76dcdabcc2f381e69a8b818f425b01dfacddd0262ab5c5aa2bedce5f53b1
-
SSDEEP
1536:02TtvTqahRlXNPOzoBDyVenpBTaZ/p9T90l79EqooGnuwGefkrzGY1cDen0QM:vhvTqKYogZxwR9Eqo9lIzGY1cFQM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb3cb4bc5fe12bc3fbfa90936a2de5d0_JaffaCakes118
Files
-
fb3cb4bc5fe12bc3fbfa90936a2de5d0_JaffaCakes118.exe windows:4 windows x86 arch:x86
26a781c20b69e84854b547acf73ac2b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
setsockopt
WSASocketA
recv
gethostname
send
ntohl
htons
listen
WSAAccept
select
__WSAFDIsSet
recvfrom
bind
getsockname
connect
getpeername
htonl
shutdown
inet_ntoa
ntohs
sendto
WSAGetLastError
closesocket
inet_addr
gethostbyname
WSAStartup
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
IsTextUnicode
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
ControlService
OpenServiceA
StartServiceA
CreateServiceA
CloseServiceHandle
OpenProcessToken
user32
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
wsprintfA
FindWindowA
SendMessageA
PostMessageA
ExitWindowsEx
KillTimer
urlmon
URLDownloadToFileA
wininet
InternetGetConnectedState
shell32
ShellExecuteA
SHGetSpecialFolderPathA
kernel32
GetStringTypeW
GetLocaleInfoA
IsBadCodePtr
IsBadReadPtr
GetCPInfo
GetOEMCP
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
CreateProcessA
GetACP
VirtualQuery
GetSystemInfo
VirtualProtect
SetUnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
SetFilePointer
SetStdHandle
GetFileAttributesA
IsBadWritePtr
HeapReAlloc
GetModuleHandleA
CloseHandle
CreateMutexA
OpenMutexA
GetCurrentProcessId
GetProcAddress
LoadLibraryA
GetVersionExA
GetModuleFileNameA
GetSystemDirectoryA
GetWindowsDirectoryA
ExitThread
GetLastError
CreateThread
ExitProcess
GetVersion
HeapFree
Sleep
HeapAlloc
GetProcessHeap
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FreeConsole
InitializeCriticalSection
ReadFile
DeleteFileA
WaitForSingleObject
DeleteCriticalSection
WriteFile
CreateFileA
TerminateProcess
GetExitCodeProcess
SetCurrentDirectoryA
GetStartupInfoA
FreeLibrary
OpenProcess
lstrcmpiA
LocalFree
WideCharToMultiByte
GetTickCount
lstrlenA
GetCurrentProcess
GetTempPathA
GetSystemTimeAsFileTime
RtlUnwind
GetCommandLineA
RaiseException
QueryPerformanceCounter
TlsFree
SetLastError
TlsSetValue
TlsGetValue
TlsAlloc
GetTimeZoneInformation
FlushFileBuffers
VirtualAlloc
oleaut32
GetErrorInfo
Sections
.text Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE