C:\Users\Batch Clayderman\source\repos\GooseBt\Debug\GooseBtSVC.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a45f7ef239df3544e9546576b9bd4b6c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a45f7ef239df3544e9546576b9bd4b6c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a45f7ef239df3544e9546576b9bd4b6c_JaffaCakes118
-
Size
1.6MB
-
MD5
a45f7ef239df3544e9546576b9bd4b6c
-
SHA1
f51ac73206ca07b0d9010488f20559fedf01c554
-
SHA256
4ae919f97a7cab9a636219e4f0eaca595913ff91b339aa980df3e9af550774ef
-
SHA512
0b3aa4cc62979ee183b857598aa12e7725d8f309e22617b38f8464772b72cd4c3298a7a974c29de996ecf057419a75327e3bb6942f4d664ee8d068615f3c2a02
-
SSDEEP
12288:3onrlJU66u/lQ3Errdfy3k8CQ6+NhGXgLbiiuuu8S7y7aBWhQuHqe9FUZpwuA58m:3gJ6yK3Errdfy3bHGXguBWhQuHqe9Os
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a45f7ef239df3544e9546576b9bd4b6c_JaffaCakes118
Files
-
a45f7ef239df3544e9546576b9bd4b6c_JaffaCakes118.exe windows:6 windows x86 arch:x86
be772ba49661befdd55a111fe00229fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateThread
CreateProcessA
OpenProcess
GetLocalTime
GetModuleFileNameA
lstrcmpW
lstrcpyW
lstrcatW
TerminateProcess
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetEndOfFile
DecodePointer
ReadConsoleW
GetCurrentProcessId
GetCurrentProcess
Sleep
CreateEventW
WaitForSingleObject
SetEvent
lstrlenW
CloseHandle
ReadFile
CreateFileW
GetConsoleMode
GetConsoleOutputCP
WaitForSingleObjectEx
SwitchToThread
GetCurrentThreadId
GetExitCodeThread
GetNativeSystemInfo
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
TryEnterCriticalSection
FormatMessageA
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
LocalFree
IsDebuggerPresent
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
CreateTimerQueue
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
OutputDebugStringW
EncodePointer
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
SetProcessAffinityMask
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
WaitForMultipleObjectsEx
LoadLibraryW
RtlUnwind
GetModuleHandleExW
ExitThread
ResumeThread
HeapValidate
GetSystemInfo
GetStdHandle
WriteFile
ExitProcess
GetCommandLineA
GetCommandLineW
GetFileType
WriteConsoleW
SetConsoleCtrlHandler
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
HeapSize
HeapQueryInformation
GetFileSizeEx
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
FlushFileBuffers
RtlCaptureStackBackTrace
user32
MessageBoxW
advapi32
SetServiceStatus
RegisterServiceCtrlHandlerW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
CreateProcessAsUserW
StartServiceCtrlDispatcherW
wtsapi32
WTSEnumerateSessionsW
WTSQuerySessionInformationW
WTSFreeMemory
Sections
.textbss Size: - Virtual size: 567KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 286KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 512B - Virtual size: 330B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 265B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ