D:\Desarroyo\Biteye.xyz\Release\Injector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
769638a15566cde1ad3702d8eea8e725_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
769638a15566cde1ad3702d8eea8e725_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
769638a15566cde1ad3702d8eea8e725_JaffaCakes118
-
Size
757KB
-
MD5
769638a15566cde1ad3702d8eea8e725
-
SHA1
d7037c82c1ba749696c61daacdedcbbc2c9e3ced
-
SHA256
1fec1391db158f862534c2b6d71c93e69d9d71e83fa18796bfc4c83005263998
-
SHA512
d86c172151be772f34348fd3bb121fc7f0d1199aa8e0d2852aca992541d1f77cebfd8950cb4a929a92cfcdd64c1d4ebb64b5f24c37481d41d2fcf4f643069947
-
SSDEEP
12288:8wKCXmmU9gUXBQVR+Rer3uNvg7oFUaVuyiMbjqn6NQ56P1R63zyfDZ0eLk86c:iN9g2BClKvgoflnfP1TbZVZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 769638a15566cde1ad3702d8eea8e725_JaffaCakes118
Files
-
769638a15566cde1ad3702d8eea8e725_JaffaCakes118.exe windows:6 windows x86 arch:x86
c50f919ed43cee9d696c7b89f8da5011
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
TerminateProcess
CreateThread
TerminateThread
CreateProcessA
GetModuleHandleW
MultiByteToWideChar
DeleteFileA
SetUnhandledExceptionFilter
QueueUserAPC
ResumeThread
VirtualAllocEx
WriteProcessMemory
lstrcmpA
FindClose
FindFirstFileA
FindNextFileA
RemoveDirectoryA
SetFileAttributesA
GetSystemWindowsDirectoryA
FreeLibrary
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
WideCharToMultiByte
GetLocalTime
GetVolumeInformationA
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetFullPathNameW
GetCurrentDirectoryW
DeleteFileW
GetModuleFileNameA
ExitProcess
CreateEventA
GetModuleHandleA
Sleep
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
ReadConsoleW
SetFilePointerEx
GetLastError
RaiseException
GetFileSizeEx
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileAttributesExW
CreateProcessW
SetEndOfFile
DecodePointer
GetExitCodeProcess
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObjectEx
SwitchToThread
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
SetLastError
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetProcAddress
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
GetCurrentThread
GetThreadTimes
SetEvent
ResetEvent
InitializeSListHead
UnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
GetModuleFileNameW
LoadLibraryExW
InterlockedPushEntrySList
WaitForSingleObject
RtlUnwind
GetStdHandle
GetFileType
GetModuleHandleExW
WriteConsoleW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
WriteFile
user32
SendMessageA
ShowWindow
CreateDialogParamA
GetDlgItem
SetDlgItemTextA
CheckDlgButton
SendDlgItemMessageA
GetSystemMetrics
MessageBoxA
GetAsyncKeyState
DialogBoxParamA
LoadImageA
gdi32
CreateSolidBrush
SetTextColor
SetBkColor
advapi32
CryptAcquireContextA
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
comctl32
ord17
ws2_32
htons
recv
send
socket
connect
WSAStartup
WSACleanup
getaddrinfo
freeaddrinfo
gethostbyname
closesocket
wininet
InternetCheckConnectionA
iphlpapi
GetAdaptersInfo
urlmon
URLDownloadToFileA
Exports
Exports
_SelfDel@16
_UninstallMSI@16
Sections
.text Size: 489KB - Virtual size: 488KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 175KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ