y:\test4\test5\Debug\test5.pdb
Static task
static1
Behavioral task
behavioral1
Sample
25326e57b976b882e839d2b0e3316eaa_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
25326e57b976b882e839d2b0e3316eaa_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
25326e57b976b882e839d2b0e3316eaa_JaffaCakes118
-
Size
448KB
-
MD5
25326e57b976b882e839d2b0e3316eaa
-
SHA1
7d0adf03e313524ea989e03909725a83738f2e83
-
SHA256
c9a01c8813c7a75b8296eb8ccf00b596c50a340652d5d672ff23b5360f94706e
-
SHA512
ec97cf6e0aaccf3c57531f0761771f323ceb3311ca1054570c1ea7fba19a7c2241b83a1c827ed319e70d6d8ffb3a224b46f01a3868b84106e529cf4e8301da08
-
SSDEEP
6144:q9jr0DjIU3LjpnvjQxoFXYRDkWzx8ss0hQp/I21o/Bb/ILI7WmX7e:ajrXCLjpnv6oRYxXzxBs0I/Z10Ik7Ly
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25326e57b976b882e839d2b0e3316eaa_JaffaCakes118
Files
-
25326e57b976b882e839d2b0e3316eaa_JaffaCakes118.exe windows:4 windows x86 arch:x86
0079c0804499a3e7803f8e5dab281dd8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
timeGetTime
kernel32
GetACP
GetLocaleInfoA
GetThreadLocale
GetTickCount
LoadLibraryA
InterlockedExchange
LoadLibraryW
FileTimeToSystemTime
GetSystemTimeAsFileTime
LocalAlloc
DeleteCriticalSection
RaiseException
GetVersionExA
GetProcAddress
ExitProcess
IsBadWritePtr
IsBadReadPtr
HeapValidate
RtlUnwind
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
HeapAlloc
HeapReAlloc
HeapFree
GetLastError
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
GetCurrentProcess
VirtualAlloc
SetConsoleCtrlHandler
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetModuleFileNameW
VirtualQuery
GetProcessHeap
CloseHandle
FreeLibrary
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
GetCPInfo
GetOEMCP
SetFilePointer
VirtualProtect
GetSystemInfo
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetEvent
OpenEventA
lstrlenA
lstrcpyA
lstrcpyW
OutputDebugStringW
lstrcpynW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetCurrentThread
GetVersion
OpenFileMappingA
GetFileType
user32
DispatchMessageA
DispatchMessageW
TranslateMessage
GetMessageA
GetMessageW
IsWindowUnicode
PeekMessageA
MsgWaitForMultipleObjects
UnregisterClassA
advapi32
OpenThreadToken
RevertToSelf
SetThreadToken
ole32
CoMarshalInterface
CreateStreamOnHGlobal
CoUnmarshalInterface
CoRevokeClassObject
CoRegisterClassObject
CoReleaseMarshalData
Sections
.text Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 216KB - Virtual size: 213KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ