C:\Users\User\AppData\Roaming\ProcessHider-master\BuildOutput\x64Hider.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fb2be8f32eeebc3c5e6b34c9a9c19a1e_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fb2be8f32eeebc3c5e6b34c9a9c19a1e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fb2be8f32eeebc3c5e6b34c9a9c19a1e_JaffaCakes118
-
Size
148KB
-
MD5
fb2be8f32eeebc3c5e6b34c9a9c19a1e
-
SHA1
45a57a1569c538dd27ceae6a3fc15bee3173757a
-
SHA256
c8fe024f656d1d889a4806b2c36f514e28879a06e4ee8a3b685177234c8d3eb2
-
SHA512
fdf7d7bdf074cd85701ebe669d136493bffc36b1ed85fe8fb5d859684ff09ae021efeae3ffd0e1716d6f88eca6fd18eb68c1d05ae75d08d56b178f862fe7431e
-
SSDEEP
3072:DIZy+Ow5fu7beTgsU8oqQniE4o3tXdyGkV6KwiQCUot:MoDw5sb2/dmi7o3RHKUot
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb2be8f32eeebc3c5e6b34c9a9c19a1e_JaffaCakes118
Files
-
fb2be8f32eeebc3c5e6b34c9a9c19a1e_JaffaCakes118.exe windows:6 windows x64 arch:x64
d9884014e308616ba02a8bf7e57b9ce2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetProcAddress
GetCurrentProcessId
IsWow64Process
HeapFree
GetLastError
CloseHandle
HeapAlloc
GetProcessHeap
LoadLibraryW
VirtualAllocEx
CreateRemoteThread
ReleaseMutex
OpenFileMappingW
UnmapViewOfFile
MapViewOfFile
OpenMutexW
Sleep
OpenProcess
GetCurrentProcess
WriteProcessMemory
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RaiseException
RtlUnwindEx
GetModuleFileNameW
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
QueryPerformanceFrequency
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
CompareStringW
LCMapStringW
GetFileType
GetStringTypeW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FindClose
FindFirstFileExW
FindNextFileW
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
HeapReAlloc
SetFilePointerEx
WriteConsoleW
CreateFileW
SetPriorityClass
advapi32
SystemFunction036
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ