C:\Users\ideni\OneDrive\Документы\Visual Studio 2013\Projects\БХОП\Release\БХОП.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4c8e7602b0e734dffa3b03fc33b3cb47_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4c8e7602b0e734dffa3b03fc33b3cb47_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4c8e7602b0e734dffa3b03fc33b3cb47_JaffaCakes118
-
Size
12KB
-
MD5
4c8e7602b0e734dffa3b03fc33b3cb47
-
SHA1
e86717db11e2ee9fb0d33213aff799ac7bc39676
-
SHA256
d8f30986211fff7f1bbfe2ec2627931143007da9cc1530ecbd9df12e79d637cb
-
SHA512
4d3d51d3667a74d1c84e3803645ba50be36c3280a6bed57abad4230a9f7f0cfdb7c1e01ebd834e00ffef19808e103bce0a23975e7dc22edd7a2fc96f64aa6a2b
-
SSDEEP
192:ulSEAuHmX61+RHp1YG3pX4aX3H8k8cG8kYcG2L2eMVkdunC9PfrA3K1PM/ii4P:ulkk+RHp1YGht3AcDcz9PfrtUKbP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c8e7602b0e734dffa3b03fc33b3cb47_JaffaCakes118
Files
-
4c8e7602b0e734dffa3b03fc33b3cb47_JaffaCakes118.exe windows:6 windows x86 arch:x86
5479d1699ee07b31e1a153c8c37f451d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetCurrentProcessId
QueryPerformanceCounter
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
GetCurrentThreadId
user32
GetAsyncKeyState
keybd_event
msvcp120
?_Xlength_error@std@@YAXPBD@Z
?uncaught_exception@std@@YA_NXZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?_Syserror_map@std@@YAPBDH@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Xbad_alloc@std@@YAXXZ
?_Winerror_map@std@@YAPBDH@Z
?_Xout_of_range@std@@YAXPBD@Z
msvcr120
_lock
??2@YAPAXI@Z
_calloc_crt
__dllonexit
??1type_info@@UAE@XZ
_XcptFilter
_amsg_exit
__getmainargs
__set_app_type
exit
_exit
_cexit
_configthreadlocale
__setusermatherr
_initterm_e
_initterm
__initenv
_fmode
_commode
_crt_debugger_hook
__crtUnhandledException
__crtTerminateProcess
_except_handler4_common
?terminate@@YAXXZ
__crtSetUnhandledExceptionFilter
_invoke_watson
_controlfp_s
??3@YAXPAX@Z
_purecall
memmove
_onexit
_CxxThrowException
__CxxFrameHandler3
_unlock
memcpy
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ