E:\SupSoftCommit\gdp_downloader_update\bin\Downloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
88e8d9f07bf143535da1f0d1bfaaaa5b_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
88e8d9f07bf143535da1f0d1bfaaaa5b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
88e8d9f07bf143535da1f0d1bfaaaa5b_JaffaCakes118
-
Size
257KB
-
MD5
88e8d9f07bf143535da1f0d1bfaaaa5b
-
SHA1
957ee64a90bf7dd9ba58b7b67aa613061623c4ef
-
SHA256
1b3b8caf3536c74c471221d09adb8b78c41b6669e270b991ffbdd687fd86a9e6
-
SHA512
ea4ae00e3cf2898378fec0f1e7b2387c85fc8fdb9cd42d16b8ed37f4ed27e99e8b2a888e03a172d174c437eb8ffdc9da57bab7d884486bc640849eeee8e4e7e1
-
SSDEEP
1536:lqZkjJT0kE/lPWS7SH8hjjPS27N6YH1xM6++sc8CKts8jcdk6LcS4N0bJN/hgdk8:lqKAxZPrjsX+eCKYkcB1FOd2xSvdO5A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88e8d9f07bf143535da1f0d1bfaaaa5b_JaffaCakes118
Files
-
88e8d9f07bf143535da1f0d1bfaaaa5b_JaffaCakes118.exe windows:5 windows x86 arch:x86
bf6ef82f937dec3361d36e9151657b74
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathRemoveFileSpecW
PathFileExistsW
wininet
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetCrackUrlW
InternetCloseHandle
InternetSetFilePointer
InternetReadFile
HttpQueryInfoW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
GetStdHandle
GetModuleHandleExW
ExitProcess
LCMapStringW
GetStartupInfoW
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
RaiseException
HeapSize
GetSystemTimeAsFileTime
HeapReAlloc
GetCommandLineW
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
GetStringTypeW
IsValidCodePage
GetACP
FindResourceW
LoadResource
LockResource
SizeofResource
FreeResource
GetModuleFileNameW
FindFirstFileW
SetFileAttributesW
DeleteFileW
FindNextFileW
GetLastError
FindClose
RemoveDirectoryW
GetTempPathW
GetTempFileNameW
CreateProcessW
WaitForSingleObject
CloseHandle
Sleep
GetFileSize
CreateFileW
SetFilePointer
WriteFile
GetSystemDefaultLCID
MultiByteToWideChar
WideCharToMultiByte
GetOEMCP
GetProcAddress
GetModuleHandleW
GetCurrentProcess
GetVolumeInformationW
GlobalAlloc
DeviceIoControl
GlobalFree
GetUserDefaultLangID
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
TerminateProcess
OutputDebugStringW
LoadLibraryW
GetVersionExW
GetSystemInfo
HeapAlloc
GetProcessHeap
FormatMessageA
FlushFileBuffers
SetLastError
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedExchange
GetCurrentThreadId
InterlockedDecrement
TlsAlloc
TlsFree
GetFileType
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
SetFilePointerEx
LoadLibraryExW
SetStdHandle
WriteConsoleW
HeapDestroy
LocalFree
HeapFree
user32
wsprintfW
GetSystemMetrics
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
ws2_32
WSAStartup
WSACleanup
Sections
.text Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ