c:\stout.pdb
Static task
static1
Behavioral task
behavioral1
Sample
97565ba82f2ba76cbf0fc68b712fa820_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
97565ba82f2ba76cbf0fc68b712fa820_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
97565ba82f2ba76cbf0fc68b712fa820_JaffaCakes118
-
Size
372KB
-
MD5
97565ba82f2ba76cbf0fc68b712fa820
-
SHA1
a5676c74978bf1d158a085634b15da5dd9e6fb70
-
SHA256
b8409eff38b243d08bc1f18448bb20cb91cce4c2c694b944f0245e071a5b5f62
-
SHA512
6edf9d274bc9de7b0fcf7cd0c041949851ff12df26c27f164804c20850ed887e395e33f3b99419d82e7127741cfb359a5d75fdff8b5fadfd70feca69b8c54b6d
-
SSDEEP
6144:yGkORa/mgncAzFUugDAJF95UP2L7LBjucaVGdnHbuJMhlYE:2OmmgncIUBDAzQe7LBj7aodia
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97565ba82f2ba76cbf0fc68b712fa820_JaffaCakes118
Files
-
97565ba82f2ba76cbf0fc68b712fa820_JaffaCakes118.exe windows:5 windows x86 arch:x86
7d6c7d7568076064bb859f4a80f7856a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MapViewOfFile
CreateFileMappingW
CreateFileW
GetTempFileNameW
GetTempPathW
UnmapViewOfFile
LockResource
LoadResource
FindResourceW
GetModuleHandleW
SizeofResource
CloseHandle
WriteConsoleW
ReadFile
RaiseException
RtlUnwind
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetLastError
HeapFree
HeapAlloc
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
Sleep
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
HeapReAlloc
LoadLibraryW
LCMapStringW
MultiByteToWideChar
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
advapi32
RegOpenKeyExW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 282KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ