d:\Work\VmFilter\Setup\InstFlt\Debug\InstFlt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
084461986f3a6f448bde2097b7b1330e_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
084461986f3a6f448bde2097b7b1330e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
084461986f3a6f448bde2097b7b1330e_JaffaCakes118
-
Size
136KB
-
MD5
084461986f3a6f448bde2097b7b1330e
-
SHA1
d6c1d41810d02291d9442dfd296b04e47f9438ba
-
SHA256
c9fec474e235f5b2b551f2f593d82e933ed6ad53f6394baa5acec618acacf8d5
-
SHA512
5d1d90a97dd57fed92a1e74ddd03f0c3bb24a52f7f6863885f15fe62c801c598048825f6533fada3ee8029e5b44836b8549a67780f5d288050d3c43798ff3d11
-
SSDEEP
1536:KV69o3Jy5BU+XgGGA5hTPuzlsvoRzKuIfFgP5srlr:KVkoaBU+Q1A3UlsvoEuIfiP5srl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 084461986f3a6f448bde2097b7b1330e_JaffaCakes118
Files
-
084461986f3a6f448bde2097b7b1330e_JaffaCakes118.exe windows:4 windows x86 arch:x86
1fa182b803209e84f01f86e3b96633be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentDirectoryA
CloseHandle
WaitForSingleObject
CreateProcessA
FreeLibrary
LoadLibraryExA
FormatMessageA
LocalFree
GetLastError
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetStdHandle
InterlockedExchange
GetLocaleInfoA
VirtualQuery
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
IsBadCodePtr
HeapReAlloc
VirtualAlloc
GetProcessHeap
HeapAlloc
SetConsoleCtrlHandler
HeapValidate
IsBadReadPtr
IsBadWritePtr
SetFilePointer
VirtualFree
HeapCreate
HeapDestroy
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
HeapFree
SetUnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
TerminateProcess
GetCurrentProcess
ExitProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
FlushFileBuffers
user32
MessageBoxA
DestroyWindow
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
SetCursor
shell32
ShellExecuteA
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsA
CM_Get_Device_IDA
SetupDiSetClassInstallParamsA
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
shlwapi
StrStrA
rpcrt4
UuidFromStringA
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ