C:\Data\Dev\Ragebot\ragebot-spiralforce-priv8\exe\tester.pdb
Static task
static1
Behavioral task
behavioral1
Sample
09d163c63cf470d7f1a2bd3e55575bff_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
09d163c63cf470d7f1a2bd3e55575bff_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
09d163c63cf470d7f1a2bd3e55575bff_JaffaCakes118
-
Size
234KB
-
MD5
09d163c63cf470d7f1a2bd3e55575bff
-
SHA1
deca238358e309842cd93440d24c84d12302c796
-
SHA256
e79b0c6784cd5e0ec4b7107dfcbbe63cb2833761ae89002a2790104f47f6bbc9
-
SHA512
aa6d9f7b88dd1eeecfa7cc3fe3691782e1361ed68114f6d740ff426680cc5ef5905dbe0f6adf46dd35f587c61ac0ffd885bab6fb8866518ba6631d1b426096a1
-
SSDEEP
6144:Osz9BVb7fnrkOe8prJPGzO5MUYbNnbbcCzxA:7zb7fng58prJPGzO5MUYbNbQS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09d163c63cf470d7f1a2bd3e55575bff_JaffaCakes118
Files
-
09d163c63cf470d7f1a2bd3e55575bff_JaffaCakes118.exe windows:5 windows x86 arch:x86
add4c49f9ba0c00d21e46c1c1078f144
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
getsockname
gethostbyname
WSAStartup
setsockopt
bind
listen
accept
WSACleanup
inet_addr
shutdown
send
recv
inet_ntoa
socket
htons
ioctlsocket
connect
select
closesocket
ntohl
htonl
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
user32
CharLowerA
kernel32
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
HeapSize
FatalAppExitA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileType
SetHandleCount
ReadFile
CloseHandle
GetCurrentProcess
FindClose
FindFirstFileA
Process32Next
DeleteFileA
SetFileAttributesA
TerminateProcess
OpenProcess
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetWindowsDirectoryA
GetSystemDirectoryA
Sleep
CopyFileA
CreateDirectoryA
LCMapStringW
GlobalFree
GlobalAlloc
UnmapViewOfFile
lstrlenA
MapViewOfFile
CreateFileMappingA
SetFilePointer
WriteFile
GetFileSize
CreateFileA
FindNextFileA
lstrcatA
GetFullPathNameA
SetCurrentDirectoryA
GetDriveTypeA
ExitThread
LeaveCriticalSection
EnterCriticalSection
CreateThread
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetTickCount
ExitProcess
CreateProcessA
WaitForSingleObject
CreateMutexA
SetErrorMode
GetTempPathA
GetLastError
GetVersionExA
TerminateThread
GetProcessHeap
GetFileAttributesA
GetModuleHandleA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
CreateFileW
SetEndOfFile
GetModuleFileNameA
ExpandEnvironmentStringsA
HeapAlloc
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
EncodePointer
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
GetProcAddress
RaiseException
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ