c:\WS\Client\Builds\Runner\1.0.0.0\Release\Runner.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0c9ae222f7cb4a725ff66a2854610505_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0c9ae222f7cb4a725ff66a2854610505_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0c9ae222f7cb4a725ff66a2854610505_JaffaCakes118
-
Size
2.6MB
-
MD5
0c9ae222f7cb4a725ff66a2854610505
-
SHA1
d2bb86361107b93acd30c43a86d300d7a6336374
-
SHA256
f48e4146268429ecd06135b206aa3d7c45554604765483a650bab54aef86f4e8
-
SHA512
2c8b030e0647b411aac5c046a84da86c9e3518779a3e3174f5fc29ad5f4178d1d997e5334fcea94939db04d17f76532018d7bf2f773284e63fc6382227a82a49
-
SSDEEP
49152:j9rcGvzDuZ83mjEEGA6F+8DX2NlGb27HWW5oQzWbzA:j9guzaAaEEN8DX43Hd5oQzWHA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c9ae222f7cb4a725ff66a2854610505_JaffaCakes118
Files
-
0c9ae222f7cb4a725ff66a2854610505_JaffaCakes118.exe windows:4 windows x86 arch:x86
8e3cc97222246d30530af8e9795a4c26
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
lstrlenW
lstrlenA
ReadFile
WideCharToMultiByte
CreateFileA
GetModuleFileNameA
CloseHandle
GetFileSize
SetFilePointer
GetTempPathA
Sleep
GetCurrentProcessId
WaitForSingleObject
DeleteFileA
GetTickCount
GetCommandLineA
MultiByteToWideChar
WriteFile
InterlockedExchange
SetEndOfFile
CreateFileW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
CreateThread
TerminateThread
GetVersionExA
GetCurrentProcess
GetProcAddress
GetModuleHandleA
ExpandEnvironmentStringsW
FreeLibrary
LoadLibraryA
InterlockedDecrement
GlobalAlloc
GetMailslotInfo
CreateMailslotA
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetACP
GetLocaleInfoA
GetThreadLocale
HeapAlloc
HeapFree
RaiseException
HeapReAlloc
VirtualAlloc
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcessHeap
GetStartupInfoA
ExitProcess
GetCPInfo
LCMapStringA
LCMapStringW
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
HeapSize
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsA
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
ShellExecuteA
user32
UpdateWindow
DefWindowProcA
PostQuitMessage
ShowWindow
DispatchMessageA
TranslateMessage
CreateWindowExA
RegisterClassA
PostMessageA
GetSystemMetrics
GetMessageA
ole32
CLSIDFromString
CoCreateGuid
StringFromGUID2
oleaut32
SysFreeString
VariantClear
SysAllocString
ws2_32
gethostbyname
htonl
sensapi
IsNetworkAlive
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ