c:\engine\Had\Though\experimenthear.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8a181685b455937c2a60f9336e67f487_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
8a181685b455937c2a60f9336e67f487_JaffaCakes118
-
Size
376KB
-
MD5
8a181685b455937c2a60f9336e67f487
-
SHA1
57d9b086f16904c9deb0b3591a1fc64cc09dc8b1
-
SHA256
55d7621989b64512ccee37bac287fb9e878952e4b158d34a700cd2c730c8b604
-
SHA512
c4fcd5301120e73485645ee3a2d15e013319f5f1d49dfeb6a20d10dab2051c2a0b4b129db613cb954c78f3679ac65f94a7ff9a88a177b183f53cc2f045b2871b
-
SSDEEP
3072:hkyrSmefi8xQRv00gDg4JVUrQrY17hJHe0KuVuPi6d+YShwaqz+UQc/uGkn3dK:hkal2i8WjgDZY9hhFxTyUOaMkN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 8a181685b455937c2a60f9336e67f487_JaffaCakes118
Files
-
8a181685b455937c2a60f9336e67f487_JaffaCakes118.exe windows:4 windows x86 arch:x86
4ad322e9d6bd29eff7c94c0123ac4c54
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindCloseChangeNotification
FindNextChangeNotification
FindFirstChangeNotificationA
Sleep
VirtualProtect
GetTempPathA
GetEnvironmentVariableA
GetModuleFileNameA
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
LoadLibraryA
GetLocaleInfoA
GetFileTime
GetCurrentProcessId
MoveFileExA
GlobalLock
GlobalAlloc
GlobalFree
SetUnhandledExceptionFilter
HeapSize
lstrcmpA
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
GetStringTypeA
RaiseException
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetLastError
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
user32
GetDlgItemInt
SetCursor
InsertMenuItemA
SetDlgItemInt
GetClientRect
CreateDialogIndirectParamA
GetForegroundWindow
GetSysColorBrush
CreatePopupMenu
DialogBoxIndirectParamA
GetWindowRect
winspool.drv
DocumentPropertiesA
OpenPrinterA
AddPrinterConnectionA
ClosePrinter
comctl32
ImageList_SetDragCursorImage
CreatePropertySheetPageA
PropertySheetA
ImageList_LoadImageA
comdlg32
ReplaceTextA
GetSaveFileNameA
GetOpenFileNameA
ole32
OleInitialize
OleCreate
OleUninitialize
shlwapi
PathAppendA
SHRegCloseUSKey
SHRegCreateUSKeyA
SHRegWriteUSValueA
StrToIntA
dbghelp
MiniDumpWriteDump
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ