c:\Road\discuss\Than\Make\neighbor\Earlyrock.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5c7b854b39d911c72b80f386a89ff952_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5c7b854b39d911c72b80f386a89ff952_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
5c7b854b39d911c72b80f386a89ff952_JaffaCakes118
-
Size
488KB
-
MD5
5c7b854b39d911c72b80f386a89ff952
-
SHA1
952dd9249ad6d02f64c9dd9eb1f243188a3df40b
-
SHA256
c5b6c43f48058769dbd70cd5762ab50e7fbb86b2fa334eb02051b1c0bcc3874b
-
SHA512
e874e573ee685e1f1d9b7c55803406df651d6cf107bf701e88d1bc2b062379ac9eca5fb5d22492619b58dbed23845daf977e2bcdf426f7f0dfcb8d80777161b1
-
SSDEEP
6144:0FiGIdbEAVa6tGfeRcgzNfNOkXcnii8rmCikLdXPT:0FiZdAAgKzNlxsii8HPT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c7b854b39d911c72b80f386a89ff952_JaffaCakes118
Files
-
5c7b854b39d911c72b80f386a89ff952_JaffaCakes118.exe windows:6 windows x86 arch:x86
5792e47dd70d029a67ac6962269dcad3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentDirectoryA
DuplicateHandle
GetModuleHandleA
OpenProcess
Sleep
GetTempPathA
CopyFileA
OpenMutexA
CreateFileA
GetCurrentThread
GetSystemDirectoryA
GetVolumeInformationA
GetVersionExA
LockResource
DeleteFileA
GetDateFormatA
ResetEvent
GetProcAddress
FindFirstChangeNotificationA
CreateDirectoryA
GetSystemTime
QueryPerformanceCounter
GetExitCodeProcess
CreateMutexA
GetEnvironmentVariableA
PeekNamedPipe
VirtualAlloc
DeviceIoControl
VirtualFree
GetCurrentProcess
LoadLibraryA
CreateFileW
HeapSize
ReadConsoleW
WriteConsoleW
SetStdHandle
FindNextFileA
FindFirstFileExA
FindClose
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
CloseHandle
SetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
GetLastError
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameA
GetACP
GetFileType
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
GetProcessHeap
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetCommandLineA
GetCommandLineW
VirtualProtect
comctl32
ImageList_Destroy
ImageList_SetIconSize
ImageList_GetImageCount
ImageList_SetBkColor
ImageList_AddMasked
ImageList_Remove
ole32
OleInitialize
CoRegisterClassObject
CoUninitialize
OleSetContainedObject
CoInitialize
OleUninitialize
CoRegisterSurrogate
shlwapi
PathGetDriveNumberA
PathFindFileNameA
wnsprintfA
PathIsUNCA
AssocQueryStringA
advapi32
SystemFunction036
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ