d:\oldqq\Act\Release\Act.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0d9d01f0077fdfd44a4e04c5819a45b2_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0d9d01f0077fdfd44a4e04c5819a45b2_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0d9d01f0077fdfd44a4e04c5819a45b2_JaffaCakes118
-
Size
104KB
-
MD5
0d9d01f0077fdfd44a4e04c5819a45b2
-
SHA1
f554e0ecf84051f88301181a42d7d407d76aeb98
-
SHA256
90b757ef92950fa6a5e6ec3ac905a23c3e881eba362d2d429f7516290e0ac645
-
SHA512
882c6051265c9d1060746b38eead4e2d8ab41f663270991e894115cfa64752ecb5d7d8f1812666f2376ba7f4b49e7ea879d61b6a04c88ee04115338eda3dd193
-
SSDEEP
1536:lDxV2lHh5i3sDHBnhG7UPCrmbKOGo1Kb6L9lJo4qQXL5izoLi4Qtxe:lDj2lHhdDH7G7prmbK2+QlWw4t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d9d01f0077fdfd44a4e04c5819a45b2_JaffaCakes118
Files
-
0d9d01f0077fdfd44a4e04c5819a45b2_JaffaCakes118.exe windows:4 windows x86 arch:x86
90dbb3a4863b3897777b8b0ed3d4a416
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstFileA
FindNextFileA
FindClose
FreeLibrary
LocalFree
GetVersionExA
MapViewOfFile
UnmapViewOfFile
ExitProcess
CreateFileA
SystemTimeToFileTime
SetFileTime
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
OpenProcess
ReadFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsBadCodePtr
FlushFileBuffers
SetStdHandle
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetCPInfo
CopyFileA
GetModuleFileNameA
Sleep
DeleteFileA
GetProcAddress
LoadLibraryA
GetLastError
WideCharToMultiByte
InterlockedDecrement
CreateMutexA
CloseHandle
ReleaseMutex
FormatMessageA
WriteFile
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
VirtualQuery
GetTimeZoneInformation
LCMapStringW
InterlockedExchange
IsBadWritePtr
VirtualAlloc
LCMapStringA
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetCurrentProcess
MultiByteToWideChar
lstrlenA
GetSystemTimeAsFileTime
IsBadReadPtr
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
user32
DispatchMessageA
RegisterClassExA
CreateWindowExA
MessageBoxA
ShowWindow
TranslateMessage
UpdateWindow
BeginPaint
PostQuitMessage
PostMessageA
SetTimer
GetMessageA
SetWindowTextA
GetWindowThreadProcessId
EnumWindows
EnumChildWindows
EndPaint
GetClassNameA
FindWindowA
DefWindowProcA
TranslateAcceleratorA
advapi32
RegEnumValueA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
SetSecurityInfo
SetEntriesInAclA
GetSecurityInfo
shell32
ShellExecuteA
ole32
CoCreateInstance
CoCreateGuid
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
VariantClear
userenv
GetProfilesDirectoryA
urlmon
CreateURLMoniker
wininet
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetSetOptionA
InternetOpenUrlA
HttpQueryInfoA
netapi32
Netbios
Sections
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE