E:\Atakan75\Loaderler\231\Release\EffeX ImGui Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b174c3de5b3c6d88dd03e4e7e502eb0c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b174c3de5b3c6d88dd03e4e7e502eb0c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
b174c3de5b3c6d88dd03e4e7e502eb0c_JaffaCakes118
-
Size
608KB
-
MD5
b174c3de5b3c6d88dd03e4e7e502eb0c
-
SHA1
0e48d389898f2ab909667514ff5acf754c02cca5
-
SHA256
a51d850d6bd5493bd7ee0abe14b6ae5559a95eecafeea36b7bf19097e835fd9c
-
SHA512
aa3e7ce566a80c13f9d4494fe6f1b7ad6990fcc4b89995f7f60145065226e470a6914c1105beffebd4cedd197e0d6993fc993b7a8099e973b9a896366a1d1509
-
SSDEEP
12288:xQ8f4gn5c8/DXVmlqMuFIuOmjo000J/VKaFHzDAUtjH5qvMrQ3kVV9TwkjYZEEwB:OocMDFaqnqvMIkHtEZ8yX3xt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b174c3de5b3c6d88dd03e4e7e502eb0c_JaffaCakes118
Files
-
b174c3de5b3c6d88dd03e4e7e502eb0c_JaffaCakes118.exe windows:6 windows x86 arch:x86
9fd4886f72bcc35aab17920450d35207
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateRemoteThread
VirtualFreeEx
GetModuleFileNameA
Process32First
VirtualProtect
UnmapViewOfFile
GetModuleHandleA
GetCurrentThread
lstrcpyA
GetSystemInfo
CreateFileMappingA
ExitProcess
GetConsoleWindow
MapViewOfFile
IsDebuggerPresent
SetUnhandledExceptionFilter
SetEndOfFile
WriteConsoleW
GetTimeZoneInformation
HeapSize
GetFullPathNameW
GetCurrentDirectoryW
GetFileSizeEx
HeapReAlloc
GetStringTypeW
GetFileSize
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
DeleteFileW
GetConsoleCP
FlushFileBuffers
CloseHandle
Process32Next
LoadLibraryA
CreateFileA
GetLastError
Sleep
GetExitCodeThread
CreateToolhelp32Snapshot
OpenProcess
VirtualAllocEx
SetStdHandle
GetProcAddress
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
ReadConsoleW
GetConsoleMode
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
CreateFileW
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
CreateThread
GetCommandLineW
GetCommandLineA
WriteFile
GetModuleFileNameW
Module32First
WaitForSingleObject
Module32Next
VirtualAlloc
VirtualFree
WriteProcessMemory
ReadFile
QueryPerformanceCounter
GetModuleHandleExW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RaiseException
RtlUnwind
DecodePointer
WideCharToMultiByte
MultiByteToWideChar
ExpandEnvironmentStringsA
WaitForMultipleObjects
PeekNamedPipe
GetFileType
GetStdHandle
FormatMessageA
VerifyVersionInfoA
GetSystemDirectoryA
VerSetConditionMask
QueryPerformanceFrequency
GlobalUnlock
GlobalLock
SleepEx
GlobalAlloc
InitializeCriticalSectionEx
SetLastError
GetTickCount64
FreeLibrary
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
GetStartupInfoW
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
user32
ReleaseCapture
GetClientRect
SetCursor
SetCapture
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
SetWindowPos
RegisterClassA
DispatchMessageA
LoadCursorA
ShowWindow
MessageBoxA
GetWindowRect
DefWindowProcA
CreateWindowExA
TranslateMessage
PeekMessageA
UnregisterClassA
PostQuitMessage
GetDesktopWindow
OpenClipboard
UpdateWindow
GetKeyState
advapi32
CheckTokenMembership
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
AdjustTokenPrivileges
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegOpenKeyExA
RegCloseKey
GetCurrentHwProfileA
RegQueryValueExA
AllocateAndInitializeSid
FreeSid
OpenProcessToken
imm32
ImmSetCompositionWindow
ImmGetContext
d3d9
Direct3DCreate9
urlmon
URLDownloadToFileA
ws2_32
WSAStartup
WSACleanup
WSAGetLastError
ntohl
htonl
gethostname
socket
__WSAFDIsSet
select
WSASetLastError
recv
send
bind
closesocket
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
WSAIoctl
ioctlsocket
getaddrinfo
freeaddrinfo
accept
listen
recvfrom
sendto
connect
crypt32
CertFreeCertificateContext
wldap32
ord143
ord46
ord60
ord50
ord41
ord22
ord27
ord26
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ord211
normaliz
IdnToAscii
wininet
InternetCheckConnectionA
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
Sections
.text Size: 482KB - Virtual size: 481KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ