c:\Users\User\Desktop\2008\API_Bomber1529871162003\Release\game.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b4f9a2ea9fe69daa115a71d23fb103fe_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
b4f9a2ea9fe69daa115a71d23fb103fe_JaffaCakes118
-
Size
358KB
-
MD5
b4f9a2ea9fe69daa115a71d23fb103fe
-
SHA1
798e1f133769c3085d4064a5ed71a2e3e19c43b7
-
SHA256
86cd175e239d567a35c0d70cba8ff2ca84274585a7ff854447908345fb775c4b
-
SHA512
7e07e388d4b72ebae2c088f3e0cdd85b6dfff78f1a8a81a13f2e1cdd11c5154dee0861db854bb83c3c40e513917b487adac1d9122cf8ebfa375fe47887a4a1cc
-
SSDEEP
6144:c2mxeTO12zPYCHaF1mWqtU66Hup4j8LULWiNuBaikfIkpA9DKsVF56MQJYAxOjmt:c2mxeTO12zPYCHaFAWqtVl6jwUiiqgUS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4f9a2ea9fe69daa115a71d23fb103fe_JaffaCakes118
Files
-
b4f9a2ea9fe69daa115a71d23fb103fe_JaffaCakes118.exe windows:5 windows x86 arch:x86
a49facc7326d82a395ebe57a841d9e58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameW
CopyFileW
ExitProcess
VirtualAlloc
GetStartupInfoA
GetModuleHandleA
user32
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
MessageBoxA
RegisterClassExA
LoadCursorA
LoadIconA
BeginPaint
GetClientRect
EndPaint
KillTimer
PostQuitMessage
GetDC
SetTimer
LoadBitmapA
DestroyWindow
GetAsyncKeyState
InvalidateRect
DefWindowProcA
FillRect
gdi32
CreateCompatibleDC
CreateBitmap
SetBkColor
CreateCompatibleBitmap
DeleteObject
GetObjectA
SelectObject
BitBlt
DeleteDC
advapi32
CryptAcquireContextA
shell32
ShellExecuteW
msvcp90
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?deallocate@?$allocator@D@std@@QAEXPADI@Z
?allocate@?$allocator@D@std@@QAEPADI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcr90
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_exit
_time64
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
??3@YAXPAX@Z
??0exception@std@@QAE@XZ
__CxxFrameHandler3
malloc
rand
srand
_invalid_parameter_noinfo
??2@YAPAXI@Z
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
memmove_s
_amsg_exit
__getmainargs
_cexit
?what@exception@std@@UBEPBDXZ
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 233KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ