C:\Users\root\Desktop\C++ Projects\Google Search Hijacker\Hijack_Smart\Search Hijack\Release\Search Hijack.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0ca4e3fd5b36fa64a19dda50b8ae1a1c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0ca4e3fd5b36fa64a19dda50b8ae1a1c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0ca4e3fd5b36fa64a19dda50b8ae1a1c_JaffaCakes118
-
Size
85KB
-
MD5
0ca4e3fd5b36fa64a19dda50b8ae1a1c
-
SHA1
5c88c6ad0933ba6654db76bf605f94a779c7ed2e
-
SHA256
7097222022a1fe2763082cabef5d2be43f2b1c18f2f4096c36e6c50b550166fe
-
SHA512
f5dba2ea5f116bd6491e3585c01cf87474eee762f2bbd9b51e7bb4aad2b213a97be5b5688ae41eb287a7c75ba0fce6189d49a967910c626223158d7ce5df8634
-
SSDEEP
1536:5GWYCNrvk6znJKfHiwcniKkcPyqCrmNR51+c:5nYakAg8PyBrmNR51+c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ca4e3fd5b36fa64a19dda50b8ae1a1c_JaffaCakes118
Files
-
0ca4e3fd5b36fa64a19dda50b8ae1a1c_JaffaCakes118.exe windows:5 windows x86 arch:x86
c26b8a733f245a6242a7a9c602e6f8fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
SetConsoleTextAttribute
LeaveCriticalSection
ExitThread
GetStdHandle
EnterCriticalSection
GetModuleFileNameA
WinExec
CreateThread
WaitForSingleObject
GetTickCount
InitializeCriticalSection
Sleep
CreateMutexA
ReleaseMutex
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
CreateProcessA
CloseHandle
GetExitCodeProcess
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetLastError
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
RaiseException
RtlUnwind
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
GetProcAddress
WriteFile
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetFileAttributesA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
CreateFileA
user32
FindWindowA
ws2_32
WSAGetLastError
recv
__WSAFDIsSet
select
send
WSAStartup
htons
bind
socket
listen
accept
inet_addr
gethostbyname
connect
closesocket
wininet
InternetReadFile
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ