C:\not\cryptor\xstubexe\Release\xstubexe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0b0aaa5205acd2cabe8084976d6b64bc_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0b0aaa5205acd2cabe8084976d6b64bc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0b0aaa5205acd2cabe8084976d6b64bc_JaffaCakes118
-
Size
817KB
-
MD5
0b0aaa5205acd2cabe8084976d6b64bc
-
SHA1
16ab00eba46077d0d2142ab92465474d22343b67
-
SHA256
412794725b4386baa7a82f14ba6c669323a4c281683a33a099001e4c228cec9c
-
SHA512
5d6df97a2f0345a4bf032784ed659ddfe04927211aaf4ccd43290adb7e70dd303584e4ae2ea02efe2bbca03ea57ad5d74593fee715461f523a406be78280e492
-
SSDEEP
24576:4/jgZ3aciyGguB6MX5Oe1i1GdWU5sMgiRwGawqPU:4gNGgbF3WTs9AWwq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b0aaa5205acd2cabe8084976d6b64bc_JaffaCakes118
Files
-
0b0aaa5205acd2cabe8084976d6b64bc_JaffaCakes118.exe windows:5 windows x86 arch:x86
6b2cdc2b88259a14aa2c3d1b8585f9ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FormatMessageA
GetPrivateProfileIntA
GetShortPathNameA
EnumResourceNamesA
lstrlenA
GetFullPathNameA
GetTempFileNameA
InterlockedCompareExchange
lstrcmpA
LockResource
EnumResourceTypesA
UnhandledExceptionFilter
GetPrivateProfileSectionA
CreateDirectoryA
GetModuleHandleA
SizeofResource
LocalAlloc
WriteFile
WideCharToMultiByte
GetCurrentProcess
GetFileInformationByHandle
UnmapViewOfFile
GetCurrentDirectoryA
GlobalFree
CopyFileA
MapViewOfFile
CompareStringA
lstrcmpiA
SetLastError
InterlockedExchange
MoveFileA
_lwrite
GetPrivateProfileStringA
ReadFile
GetTempPathA
GetVersionExA
GetModuleFileNameA
LoadResource
CreateProcessA
Sleep
GetSystemTime
FindResourceExA
QueryPerformanceCounter
GlobalLock
LoadLibraryExA
GetSystemTimeAsFileTime
FreeLibrary
IsDBCSLeadByte
GetCurrentThreadId
GetTickCount
GetModuleHandleW
GlobalUnlock
_lclose
GetStartupInfoA
EnumResourceLanguagesA
_llseek
CloseHandle
CreateFileA
GetCurrentProcessId
SetFileAttributesA
GetSystemInfo
CreateFileMappingA
GlobalAlloc
DeleteFileA
GetLastError
ExitProcess
HeapAlloc
GetProcessHeap
HeapCreate
IsDebuggerPresent
FreeResource
RtlUnwind
MultiByteToWideChar
GetExitCodeProcess
TerminateProcess
_lread
FindFirstFileA
GetFileAttributesA
SetUnhandledExceptionFilter
GetUserDefaultUILanguage
LocalFree
GetVersion
GetProcAddress
FindClose
WritePrivateProfileSectionA
WritePrivateProfileStringA
user32
GetSystemMetrics
PeekMessageA
DispatchMessageA
SetWindowLongA
MessageBeep
SetDlgItemTextA
CharPrevA
IsDlgButtonChecked
GetParent
ShowWindow
SetFocus
CheckDlgButton
SystemParametersInfoW
ReleaseDC
MessageBoxA
CharNextA
MsgWaitForMultipleObjects
CallWindowProcA
GetWindowRect
CheckRadioButton
SendDlgItemMessageA
GetDlgItem
GetWindowLongA
SendMessageA
GetDlgItemTextA
PostMessageA
GetDC
EnableWindow
LoadStringA
gdi32
GetDeviceCaps
GetStockObject
CreateFontIndirectA
GetObjectA
DeleteObject
CreateFontIndirectW
shell32
SHGetDesktopFolder
SHBrowseForFolderA
ole32
CoInitialize
netapi32
NetApiBufferAllocate
secur32
QuerySecurityPackageInfoA
FreeCredentialsHandle
DeleteSecurityContext
Exports
Exports
antiemu32
Sections
.text Size: 801KB - Virtual size: 801KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bddx Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sos Size: 512B - Virtual size: 39B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ