C:\Users\DODO\Videos\TwoStageSearch\TwoStageSearch\TwoStageSearch\Release\TwoStageSearch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8e652b2b2e1ef8a687412d3beb84091b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
8e652b2b2e1ef8a687412d3beb84091b_JaffaCakes118
-
Size
667KB
-
MD5
8e652b2b2e1ef8a687412d3beb84091b
-
SHA1
28f2f007259f84192f8d331c9861f7ab2c2a6279
-
SHA256
1ff61a396dea6d6b4b4c91b0f58e44aba4a9c7eb4969418475e37ca5f40f0909
-
SHA512
775f46d9c7b35b9b28b364b54242c1963724ccf0d88edfc5a7b2bee9cc890bb4b9bcdb1b293c923245898226d8c9bd5b2e35abeb66593f85be2477d3f8a4cee0
-
SSDEEP
12288:76JJG//tnC5VCFSoDpaQlHfl6mCiWDaBMNCkbnG:76J6/tniVNoDgQVN6mCip9kbG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e652b2b2e1ef8a687412d3beb84091b_JaffaCakes118
Files
-
8e652b2b2e1ef8a687412d3beb84091b_JaffaCakes118.exe windows:6 windows x86 arch:x86
beb5959bb1e83e2e3f4789da7e63bdcd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetExitCodeProcess
ReadFile
CreateFileW
GetTempPathW
GetFileSizeEx
GetLastError
GetCurrentDirectoryW
GetProcAddress
VirtualAlloc
FindClose
SetCurrentDirectoryW
FindNextFileW
CloseHandle
DeleteFileW
FlushFileBuffers
GetFullPathNameA
WriteConsoleW
CreateProcessW
WaitForSingleObject
ReadConsoleW
SetEndOfFile
GetTimeZoneInformation
SetStdHandle
RtlUnwind
HeapReAlloc
OutputDebugStringW
LoadLibraryExW
FreeLibrary
SetConsoleCtrlHandler
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LoadLibraryW
GetStringTypeW
SetEnvironmentVariableW
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
RaiseException
GetFileAttributesExW
CreateSemaphoreW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetFullPathNameW
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
HeapSize
GetModuleFileNameW
WriteFile
GetStdHandle
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
GetCurrentThreadId
GetModuleHandleW
GetLocaleInfoW
FindFirstFileExW
GetLogicalDriveStringsW
GetEnvironmentVariableW
GetCurrentThread
SetLastError
GetCPInfo
GetOEMCP
SetFilePointer
FindFirstFileW
CreateFileA
GetTempFileNameW
FatalAppExitA
GetACP
IsValidCodePage
GetCommandLineW
HeapFree
HeapAlloc
EncodePointer
DecodePointer
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
IsDebuggerPresent
IsProcessorFeaturePresent
SetEnvironmentVariableA
user32
EndPaint
ClientToScreen
DestroyWindow
GetWindowTextLengthW
TranslateAcceleratorW
ScreenToClient
GetWindowRect
SetActiveWindow
GetMessageW
SendInput
PostQuitMessage
SetKeyboardState
GetKeyState
GetSubMenu
GetFocus
DialogBoxParamW
GetParent
LoadCursorW
GetClipCursor
FindWindowW
GetClientRect
SetFocus
BeginPaint
wsprintfW
TranslateMessage
LoadAcceleratorsW
GetKeyboardState
GetMenu
RegisterClassExW
OffsetRect
GetAsyncKeyState
MessageBoxA
SetCursorPos
LoadMenuW
GetAncestor
GetWindowTextW
PeekMessageW
GetDlgItem
EndDialog
GetDesktopWindow
GetCursorPos
LoadStringW
EnumChildWindows
ShowWindow
SetMenu
GetSysColorBrush
LoadBitmapW
CreateDialogParamW
FindWindowExW
ClipCursor
CreateWindowExW
SetMenuDefaultItem
MessageBoxW
GetComboBoxInfo
GetSystemMetrics
IsWindowVisible
SendMessageW
UpdateWindow
GetDlgCtrlID
SetWindowTextW
DefWindowProcW
CopyRect
GetWindow
MoveWindow
DispatchMessageW
LoadIconW
gdi32
CreateFontW
DeleteObject
advapi32
CryptAcquireContextA
shell32
ShellExecuteW
SHOpenWithDialog
ShellExecuteExW
comctl32
ord413
ImageList_Add
ImageList_Create
ord410
shlwapi
ord191
PathMatchSpecW
Exports
Exports
T5676thdrgddhf
Sections
.text Size: 385KB - Virtual size: 384KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ