C:\Users\FORMATC\source\repos\Loader\Release\Stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2bd388c66e00ddc9b2811c8352c270f3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2bd388c66e00ddc9b2811c8352c270f3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2bd388c66e00ddc9b2811c8352c270f3_JaffaCakes118
-
Size
199KB
-
MD5
2bd388c66e00ddc9b2811c8352c270f3
-
SHA1
071c2aee7106e3d607e7e6ebc73c9ee52fe4b939
-
SHA256
d4d52f4b3d4693fb8ed5f19a6d37344bbcab0c72b0e72dbf7625155e42041066
-
SHA512
55d003788d43db946f8651db86d4accdba71e4581d067bd9dffd38e5d3c8d91758e7ced55deb6d4f3fbe5adf8e256fd3ea84bf073ab2be270e3bc1c117cba3ee
-
SSDEEP
6144:v4uC+QQI5Ju27nn1/b7rGMbuL+54FAOYOVr:vjQQI5Ju6xbuL+eair
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2bd388c66e00ddc9b2811c8352c270f3_JaffaCakes118
Files
-
2bd388c66e00ddc9b2811c8352c270f3_JaffaCakes118.exe windows:6 windows x86 arch:x86
4bd895efdf76b5d04a976f7bdb6a6376
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateToolhelp32Snapshot
WriteConsoleW
HeapSize
GetProcessHeap
Module32First
Module32Next
GetModuleFileNameA
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
GetLastError
FreeLibrary
LoadLibraryExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
CloseHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapFree
GetCurrentDirectoryW
HeapAlloc
GetFullPathNameW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
ReadFile
ReadConsoleW
HeapReAlloc
GetTimeZoneInformation
SetEndOfFile
user32
MessageBoxA
advapi32
GetUserNameA
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
wininet
InternetCloseHandle
InternetSetOptionA
InternetOpenA
HttpSendRequestA
InternetConnectA
InternetReadFile
HttpOpenRequestA
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ