C:\Workspace\Projects\Windows\Installer\Tools\KxRun\Release\KxRun.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2395267f66600617a0a7c7c340dc7506_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2395267f66600617a0a7c7c340dc7506_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
2395267f66600617a0a7c7c340dc7506_JaffaCakes118
-
Size
150KB
-
MD5
2395267f66600617a0a7c7c340dc7506
-
SHA1
69718d323cc9839a92a1a1bd5917827dc1ff9e03
-
SHA256
f801ec39f263f0dc3ec23489fcb2ec7043b5f58f85fddeacd174eb860cf010d6
-
SHA512
afa2aac57535b7c52fbc132994b4ca748ea6c629f2814eeab1fe3366c5e7f4aa060e88e6af28db458bcb3bc1c5c5586eff77fc589b4765b6b99ab378ab58847c
-
SSDEEP
1536:R9z2GNRJ3bsg0Cmu+RZSIfLWS7bvjb0Zuw5MHN3K+MVwN58Zp/:vqGNRdbzoNLhUnl+h58Zp/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2395267f66600617a0a7c7c340dc7506_JaffaCakes118
Files
-
2395267f66600617a0a7c7c340dc7506_JaffaCakes118.exe windows:5 windows x86 arch:x86
0aefbbaaf5e81a7335085fafaca83230
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedDecrement
GetModuleHandleW
OpenProcess
Sleep
LoadLibraryA
lstrlenA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
InitializeCriticalSectionAndSpinCount
HeapSize
GetWindowsDirectoryW
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
SetLastError
GetSystemDirectoryA
GetModuleFileNameW
GetVersionExW
GetSystemDirectoryW
GetWindowsDirectoryA
GetProcessHeap
HeapFree
GetCurrentProcess
HeapAlloc
GetLocaleInfoA
CreateFileA
CloseHandle
GetLocalTime
GetLastError
MultiByteToWideChar
GetACP
WideCharToMultiByte
OutputDebugStringW
HeapReAlloc
VirtualAlloc
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteFile
ExitProcess
DeleteCriticalSection
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
user32
wsprintfW
GetWindowThreadProcessId
GetShellWindow
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RevertToSelf
ImpersonateLoggedOnUser
LookupAccountSidW
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteW
ole32
CoUninitialize
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
shlwapi
AssocQueryStringW
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ