D:\dTXq820XJmCie0d.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0489ae244839c04f3b730e7a3db135ef_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0489ae244839c04f3b730e7a3db135ef_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0489ae244839c04f3b730e7a3db135ef_JaffaCakes118
-
Size
200KB
-
MD5
0489ae244839c04f3b730e7a3db135ef
-
SHA1
66f54b5ec27a2623a3674e4391d5b3aee286db0c
-
SHA256
b8796b91c089d9487a2969ff3675cfed0565820bfe1fd20e529c2c474e0b550d
-
SHA512
c6a929a33dbc1909492a6e1c88b39ade1750a67da9fe5c05884788123854249e2303a2be9469d454fc2910be608e0114879a9ab881549769245e64e9e7ee3537
-
SSDEEP
3072:hysVrUWgthnnnnnDY1GFIkgs7sH2g1Uj4q11FcffKv4iNuMSGFkpOe:/z2bosFj2fyv4nMSl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 0489ae244839c04f3b730e7a3db135ef_JaffaCakes118
Files
-
0489ae244839c04f3b730e7a3db135ef_JaffaCakes118.exe windows:4 windows x86 arch:x86
af1b7aea4b4485797c678ee96349cc10
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
GetModuleHandleA
GetLastError
HeapFree
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
RaiseException
DebugBreak
WideCharToMultiByte
IsDebuggerPresent
MultiByteToWideChar
GetProcAddress
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
Sleep
RtlUnwind
FreeLibrary
GetModuleFileNameW
VirtualQuery
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
CreateFileA
CloseHandle
FlushFileBuffers
user32
wvsprintfA
wsprintfA
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ