d:\PROJ_BIN\imp64b\x64\Release\imp64b.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0d6ce9c25d44e198e3f96c846c472227_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0d6ce9c25d44e198e3f96c846c472227_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0d6ce9c25d44e198e3f96c846c472227_JaffaCakes118
-
Size
78KB
-
MD5
0d6ce9c25d44e198e3f96c846c472227
-
SHA1
3c31fbc508de1f7970e22d3ba767392bff226914
-
SHA256
176806e07fdd05e2b990124d59be8ba640736550efe71f052c8fc52775b12af5
-
SHA512
746aa98dbe69169bf556121448f1eb8941fa9e89856300586c95e8bfed41b1ae982fd1f210403707c9aaf2d0f887f22c97633608baeacc40c4177058e9e8612a
-
SSDEEP
1536:oiKoLGPCuUntPXtl0o6t/eINPC9WhQQ6isKldZ:OGGPCznt/ts1LNPC9aQQ3d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d6ce9c25d44e198e3f96c846c472227_JaffaCakes118
Files
-
0d6ce9c25d44e198e3f96c846c472227_JaffaCakes118.exe windows:5 windows x64 arch:x64
16791c45c1d25a79a0502920df303292
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
OpenProcess
GetCurrentProcessId
lstrcpynW
GetStartupInfoW
GetCommandLineW
GetExitCodeProcess
WaitForSingleObject
ProcessIdToSessionId
GetLastError
lstrlenW
CloseHandle
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
HeapSetInformation
HeapCreate
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetUnhandledExceptionFilter
RtlUnwindEx
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
HeapReAlloc
advapi32
SetTokenInformation
CreateProcessAsUserW
OpenProcessToken
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
� Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE