d:\Ryan Project\Anti-AntiVirus\AntiAntiVirus_command\AntiAntiVirus_command1.7\bin\release\stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0d4dbd47eb3481db319c2c2567fe0ed6_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0d4dbd47eb3481db319c2c2567fe0ed6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0d4dbd47eb3481db319c2c2567fe0ed6_JaffaCakes118
-
Size
984KB
-
MD5
0d4dbd47eb3481db319c2c2567fe0ed6
-
SHA1
982a62c16b5bb22e4916eff11bea8169a8d2d5c1
-
SHA256
8a08eff371cacf23128a7a43da6001729dbf1be5dca5b453332a4bb691ee78f3
-
SHA512
a59ecbe502e7a967bba753b7185b58c139770c1cb4a1104de72bda6a508dff81e99e56d4f552a36e10ad20eb1edfb999cb330be62eeb90bc0ed1bbad7a29cf67
-
SSDEEP
12288:CetFG88rTJZi6wFv9bGNpOdDALvNJ95uBoPyZPgXBQJjXpK2CcTCvRyG9NkVYBbw:CetFIivFFCNpOCLvNLahZPS+XB7Zo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d4dbd47eb3481db319c2c2567fe0ed6_JaffaCakes118
Files
-
0d4dbd47eb3481db319c2c2567fe0ed6_JaffaCakes118.exe windows:4 windows x86 arch:x86
60f65348afff20c30d3b2454356a2308
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OutputDebugStringW
GetModuleFileNameA
GetTempPathW
LoadLibraryW
CreateDirectoryW
GetModuleFileNameW
FreeLibrary
GetProcAddress
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
GetModuleHandleA
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
ReadFile
WriteFile
GetConsoleCP
GetConsoleMode
CloseHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FlushFileBuffers
SetFilePointer
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
HeapSize
LoadLibraryA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetLocaleInfoW
CreateFileW
SetEndOfFile
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Smiley Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
. Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE