C:\Users\Administrator\Desktop\ppyy\2015-9-16\papa-sample\Release\papa-sample.pdb
Static task
static1
Behavioral task
behavioral1
Sample
50d0eeb5f7b2657ef9449f4b023ec164_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
50d0eeb5f7b2657ef9449f4b023ec164_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
50d0eeb5f7b2657ef9449f4b023ec164_JaffaCakes118
-
Size
726KB
-
MD5
50d0eeb5f7b2657ef9449f4b023ec164
-
SHA1
3b49a623038bdb87a64b2d49122da99068b55e3f
-
SHA256
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14
-
SHA512
d0f30087f24bcb94b36712326ccb29dae7a9593f0652578548405b1d20f20b5ed78f30d9622ed273e756f0ac83359f0579978089d4f450268898b9ed5eecd4c7
-
SSDEEP
12288:VlbkwNhrNTTxjZBx/jd0PX49c5oLeq5pZ1VzYWIQAJpe:Vqw5TTD37d0/HmcWIQAe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 50d0eeb5f7b2657ef9449f4b023ec164_JaffaCakes118
Files
-
50d0eeb5f7b2657ef9449f4b023ec164_JaffaCakes118.exe windows:5 windows x86 arch:x86
22b184122461661c8a2d09b5e5e40af1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
InternetOpenW
kernel32
OutputDebugStringW
LoadLibraryW
GetProcAddress
FreeLibrary
CreateMutexW
GetLastError
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
GetLogicalDriveStringsW
GetModuleFileNameW
Process32FirstW
Process32NextW
SetStdHandle
GetModuleHandleW
GetSystemInfo
GetVersionExW
CreateFileW
DeviceIoControl
InterlockedDecrement
LocalFree
lstrlenA
SetEndOfFile
WriteConsoleW
LCMapStringW
CreateToolhelp32Snapshot
GetCurrentThreadId
EncodePointer
DecodePointer
GetCommandLineW
ReadFile
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
RaiseException
RtlUnwind
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
SetLastError
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EnterCriticalSection
LeaveCriticalSection
SetFilePointerEx
GetConsoleCP
GetConsoleMode
ReadConsoleW
GetACP
IsValidCodePage
GetOEMCP
GetCPInfo
GetStringTypeW
LoadLibraryExW
HeapReAlloc
FlushFileBuffers
user32
GetSystemMetrics
FindWindowW
FindWindowExW
SendMessageW
oleaut32
SysFreeString
SysAllocString
VariantClear
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 531KB - Virtual size: 531KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ