G:\p4\Dev\Main.PD\Source\NetworkMagic\bin.shp\nmapp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0fe6fd0650e5ff10fb6bf6ec1013845a_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0fe6fd0650e5ff10fb6bf6ec1013845a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0fe6fd0650e5ff10fb6bf6ec1013845a_JaffaCakes118
-
Size
529KB
-
MD5
0fe6fd0650e5ff10fb6bf6ec1013845a
-
SHA1
e9f7a4322089869eb99d0838970fb954542fe0d7
-
SHA256
40857b8448372149de82e0797360ba21c17b9296f12023ed2fe0a418434910eb
-
SHA512
6e21a8e9d0d1667806990b1aa7f272802edd291b23366ff369cc6ac29fbf20d0c8cede78bed24f44a8b85f6d14e62e28669e6306f10c1367a5fa3bc24f8c7393
-
SSDEEP
12288:1ImoW/b96Zku5DyqcNqhrmPFgYTUwgvc0Xh5EQvLN9TLqxG:WibStyxqhrmPFgYTUw2h2yNGG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fe6fd0650e5ff10fb6bf6ec1013845a_JaffaCakes118
Files
-
0fe6fd0650e5ff10fb6bf6ec1013845a_JaffaCakes118.exe windows:5 windows x86 arch:x86
3119168dffd96ccf940f12a7939cb93e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryW
GetLastError
GetCurrentDirectoryW
FreeLibrary
GetProcAddress
SetEnvironmentVariableA
CompareStringW
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringA
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
LCMapStringW
VirtualAlloc
GetTimeZoneInformation
GetDateFormatA
GetTimeFormatA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
VirtualFree
HeapCreate
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
ExitProcess
GetModuleHandleW
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetProcessHeap
HeapSize
LocalAlloc
LocalFree
InterlockedExchange
LoadLibraryA
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
InterlockedIncrement
ReleaseMutex
InterlockedDecrement
GetCurrentThreadId
WriteFile
SetEndOfFile
SetFilePointer
lstrlenA
Sleep
InterlockedCompareExchange
SizeofResource
LockResource
LoadResource
TlsFree
TlsSetValue
TlsGetValue
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
TlsAlloc
WaitForMultipleObjects
GetCurrentProcess
GetCurrentThread
GetSystemInfo
GetModuleFileNameA
SetLastError
GetCurrentProcessId
ReadFile
GetTickCount
QueryPerformanceCounter
CompareStringA
GetModuleHandleA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
oleaut32
VariantClear
VarDateFromStr
SysAllocStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
shlwapi
PathCombineW
PathFileExistsW
PathRemoveFileSpecW
PathAppendW
UrlCanonicalizeW
PathAddBackslashW
user32
GetSystemMetrics
shell32
SHGetSpecialFolderPathW
Sections
.text Size: 242KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.prdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE