c:\production-recompile\preloader_2013\PRELOADER_7_RC1\recompile\2014071516013872\bin\Win32\Release\preloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a43f99a521759d09278f40213cb1f6bc_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a43f99a521759d09278f40213cb1f6bc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a43f99a521759d09278f40213cb1f6bc_JaffaCakes118
-
Size
807KB
-
MD5
a43f99a521759d09278f40213cb1f6bc
-
SHA1
174b28e25bb2d2b5595ba698c0f98326a703e697
-
SHA256
21869330e81a42cfd070531f0314a65878ac2c6a8e1853299ceb8d0d9f0a7db9
-
SHA512
106998d99a395d104560da82eed0993a8c9f90dcbf9988e8eb0a1e71bb51446e1dd8d17d33ee4256f5f7348e9f965a05df64087b80b0e7e7de240a071a5320c9
-
SSDEEP
24576:0FU3XZISMSND63ZpF5esIFCSEgUMsXfa24UJT0TTsMai9us87:HMSNOZD5dIAvgxsy2HJ4RR9ux7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a43f99a521759d09278f40213cb1f6bc_JaffaCakes118
Files
-
a43f99a521759d09278f40213cb1f6bc_JaffaCakes118.exe windows:5 windows x86 arch:x86
e35a6634f21fade0522c0742742c5834
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
EnterCriticalSection
LoadLibraryA
GetModuleHandleA
CloseHandle
InterlockedIncrement
InterlockedDecrement
GetModuleHandleExW
VirtualFree
IsBadReadPtr
GetLastError
GetProcAddress
GetFullPathNameW
GetEnvironmentVariableW
GetCurrentDirectoryW
GetFileAttributesExW
LeaveCriticalSection
DeleteCriticalSection
WaitForSingleObject
GetProcessHeap
WriteFile
SetLastError
DeleteFileA
ExitProcess
HeapReAlloc
MoveFileExA
CreateProcessW
SetUnhandledExceptionFilter
SystemTimeToFileTime
GetCurrentProcess
GetTickCount
OpenProcess
TerminateProcess
GetTempFileNameA
GetLocalTime
GetProcessId
AddVectoredExceptionHandler
DuplicateHandle
GetTempPathA
GetThreadContext
GetCurrentThread
WideCharToMultiByte
GetFileAttributesA
MultiByteToWideChar
CreateDirectoryA
RemoveDirectoryA
FindClose
GetCurrentDirectoryA
GetCurrentProcessId
CreateFileW
InterlockedCompareExchange
HeapFree
HeapAlloc
FreeLibrary
UnmapViewOfFile
GetFileSize
WriteConsoleW
FlushFileBuffers
GetCurrentThreadId
LoadLibraryExW
GetCommandLineA
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
GetStdHandle
GetModuleFileNameW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetConsoleMode
SetFilePointerEx
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleCP
OutputDebugStringW
LoadLibraryW
LCMapStringW
GetStringTypeW
SetStdHandle
VirtualQuery
user32
MessageBoxA
advapi32
RegOpenKeyExA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
shell32
ShellExecuteExW
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ