c:\engine\Had\Though\experimenthear.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7f672c049c8a1b45ff27aa214d4b08bf_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
7f672c049c8a1b45ff27aa214d4b08bf_JaffaCakes118
-
Size
376KB
-
MD5
7f672c049c8a1b45ff27aa214d4b08bf
-
SHA1
98db8b02f5406572f00299a9b547e6126097399d
-
SHA256
fa1dd1fdc658471094c68cbd0b3a81918c857e79c1078b6a33e9781793dbecaa
-
SHA512
1df56c02d55e08dfa6970fb1a75a923e33b57bd4797890e68d838e560a814ab984e86e43faf67da6f1db096eb28971629e1740d37e9fcb5f82d04b452d28c606
-
SSDEEP
3072:hkyrSmefi8xQRv00gDg4JEUrQrY17hJHe0KuVuPi6d+YShwaqz+UQc/uGkn3dK:hkal2i8WjgDmY9hhFxTyUOaMkN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7f672c049c8a1b45ff27aa214d4b08bf_JaffaCakes118
Files
-
7f672c049c8a1b45ff27aa214d4b08bf_JaffaCakes118.exe windows:4 windows x86 arch:x86
4ad322e9d6bd29eff7c94c0123ac4c54
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindCloseChangeNotification
FindNextChangeNotification
FindFirstChangeNotificationA
Sleep
VirtualProtect
GetTempPathA
GetEnvironmentVariableA
GetModuleFileNameA
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
LoadLibraryA
GetLocaleInfoA
GetFileTime
GetCurrentProcessId
MoveFileExA
GlobalLock
GlobalAlloc
GlobalFree
SetUnhandledExceptionFilter
HeapSize
lstrcmpA
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
GetStringTypeA
RaiseException
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetLastError
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
user32
GetDlgItemInt
SetCursor
InsertMenuItemA
SetDlgItemInt
GetClientRect
CreateDialogIndirectParamA
GetForegroundWindow
GetSysColorBrush
CreatePopupMenu
DialogBoxIndirectParamA
GetWindowRect
winspool.drv
DocumentPropertiesA
OpenPrinterA
AddPrinterConnectionA
ClosePrinter
comctl32
ImageList_SetDragCursorImage
CreatePropertySheetPageA
PropertySheetA
ImageList_LoadImageA
comdlg32
ReplaceTextA
GetSaveFileNameA
GetOpenFileNameA
ole32
OleInitialize
OleCreate
OleUninitialize
shlwapi
PathAppendA
SHRegCloseUSKey
SHRegCreateUSKeyA
SHRegWriteUSValueA
StrToIntA
dbghelp
MiniDumpWriteDump
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ