C:\Software Dev\imageUSB\Release\imageUSB.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aea2763b74c78e3632c37230ad09b397_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
aea2763b74c78e3632c37230ad09b397_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
aea2763b74c78e3632c37230ad09b397_JaffaCakes118
-
Size
1.9MB
-
MD5
aea2763b74c78e3632c37230ad09b397
-
SHA1
1707cc6cef9a5f4f61dc41cc4ce034c356a3f945
-
SHA256
a1e43591af24c18b997783be48fa6a0587cde63b8bb974fd312cf2ac98f6667e
-
SHA512
693ad2a5157587a6e7747441bc48e09edd0873d730f4015f81e2a0beb9abc8267c6f7df4cc94dcc633a0502b88882fda97fba80734921700ad1523b97117fb94
-
SSDEEP
49152:VTIOLNsJpBaonbrk0MlLTBFPFGNK/b337CWKt7v:VTipBaMrMlPBFtMibO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aea2763b74c78e3632c37230ad09b397_JaffaCakes118
Files
-
aea2763b74c78e3632c37230ad09b397_JaffaCakes118.exe windows:6 windows x86 arch:x86
795701c99632b7703dd628299275865a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathRemoveExtensionW
PathRemoveFileSpecW
PathCombineW
PathFindFileNameW
PathFindExtensionW
PathStripToRootW
comctl32
ImageList_ReplaceIcon
ImageList_Create
ImageList_Destroy
kernel32
GetLastError
WideCharToMultiByte
GetModuleFileNameW
LoadLibraryW
FreeLibrary
LoadLibraryExW
CreateDirectoryW
SetLastError
SetFileTime
CreateFileW
GetCurrentThreadId
SetFileAttributesW
DeleteFileW
CloseHandle
GetProcAddress
GetCurrentProcessId
GetModuleHandleW
GetTickCount
FindFirstFileW
FindNextFileW
FindClose
GetFileAttributesW
GetModuleHandleA
GetLogicalDriveStringsW
SetFilePointer
SetEndOfFile
GetFileSize
VirtualFree
VirtualAlloc
GetVolumeInformationW
GetDiskFreeSpaceW
DeviceIoControl
GetVersionExW
GetDiskFreeSpaceExW
GetDriveTypeW
QueryPerformanceFrequency
QueryPerformanceCounter
GetFileSizeEx
FindFirstVolumeW
GetCommandLineW
CreateMutexW
InitializeCriticalSectionEx
WaitForSingleObject
LocalAlloc
ReleaseMutex
GetExitCodeThread
Sleep
FormatMessageW
GetProcessHeap
CreateThread
GetLocalTime
DecodePointer
GetFileInformationByHandle
LocalFree
GetTimeFormatW
DeleteCriticalSection
VerSetConditionMask
FindVolumeClose
GetVolumePathNamesForVolumeNameW
VerifyVersionInfoW
FindNextVolumeW
GetDateFormatW
TerminateThread
SetDllDirectoryW
GetCurrentThread
GetThreadTimes
SetUnhandledExceptionFilter
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
RtlCaptureContext
GetCurrentProcess
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
FlushFileBuffers
GetConsoleCP
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadConsoleW
GetConsoleMode
HeapSize
HeapReAlloc
GetFileType
HeapAlloc
HeapFree
ExitThread
SetConsoleCtrlHandler
GetModuleHandleExW
ExitProcess
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
FreeLibraryAndExitThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
WriteFile
GetStdHandle
ReadFile
MultiByteToWideChar
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetFilePointerEx
GetOEMCP
WriteConsoleW
RaiseException
CreateTimerQueue
OutputDebugStringW
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
ResetEvent
SetEvent
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
SwitchToThread
WaitForSingleObjectEx
DuplicateHandle
GetStringTypeW
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
user32
DialogBoxParamW
InvalidateRect
PostQuitMessage
KillTimer
GetDlgItem
GetClientRect
EnableWindow
GetWindowTextW
CharUpperW
GetParent
MonitorFromWindow
SetWindowLongW
GetWindowLongW
GetWindowTextLengthW
GetMessageW
CreateDialogParamW
DefWindowProcW
GetWindowRect
DestroyWindow
SetWindowPos
MessageBoxW
IsWindowVisible
CreateWindowExW
ScreenToClient
SendMessageW
EndDialog
GetSystemMetrics
SetWindowTextW
MessageBeep
ShowWindow
DispatchMessageW
SetTimer
IsDialogMessageW
DestroyIcon
GetMonitorInfoW
GetDlgCtrlID
SetDlgItemTextW
SendDlgItemMessageW
MessageBoxA
IsWindowEnabled
MoveWindow
TranslateMessage
LoadIconW
gdi32
SelectObject
CreateFontW
GetStockObject
SetTextColor
CreatePen
Rectangle
SetBkColor
DeleteObject
CreateSolidBrush
comdlg32
GetSaveFileNameW
shell32
DragAcceptFiles
ShellExecuteW
CommandLineToArgvW
DragQueryFileW
ole32
CoInitialize
CoInitializeEx
CLSIDFromString
CoSetProxyBlanket
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoCreateGuid
CoUninitialize
oleaut32
SysFreeString
VariantInit
SysAllocString
VariantClear
dbghelp
SymFromAddr
SymCleanup
StackWalk64
SymInitialize
SymFunctionTableAccess64
SymGetLineFromAddr64
SymGetModuleBase64
Sections
.text Size: 737KB - Virtual size: 736KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 920KB - Virtual size: 920KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
OGRE2.01 Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE