C:\Users\leonk\Desktop\תכנות קורס\Perek 6\Debug\Targil 1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0da1cb9ff3369aae318f0538a7d8ac0a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0da1cb9ff3369aae318f0538a7d8ac0a_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0da1cb9ff3369aae318f0538a7d8ac0a_JaffaCakes118
-
Size
38KB
-
MD5
0da1cb9ff3369aae318f0538a7d8ac0a
-
SHA1
8cec500c227383325a4506d1ea8f14d74c010d81
-
SHA256
09130c45dc9a0c699c3572aaf8a2a3ff443e5d5da89a4d14cb4cf480f1cf8ed3
-
SHA512
ac30470e7efe5306f7186baed2d71f96ba5d4713f2157f814baba784ebade122b13f8d8cb699b05ec4bbba84d8e61f0d4be0a854ebaf6264a1a3089c6fb0668f
-
SSDEEP
384:RdoWMY7ufvp9d/9YkXhn/6sYoKHWIGisYpcIAoD2l7o:gLfvp9d/9YkXh/u2IuYpHAoDt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0da1cb9ff3369aae318f0538a7d8ac0a_JaffaCakes118
Files
-
0da1cb9ff3369aae318f0538a7d8ac0a_JaffaCakes118.exe windows:6 windows x86 arch:x86
d007e41aa491a22b214f9e9e8306ec2b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
vcruntime140d
__vcrt_GetModuleFileNameW
_except_handler4_common
memset
__vcrt_GetModuleHandleW
__vcrt_LoadLibraryExW
__std_type_info_destroy_list
ucrtbased
__p__commode
strcpy_s
strcat_s
__stdio_common_vsprintf_s
_configthreadlocale
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
_controlfp_s
terminate
_wmakepath_s
_wsplitpath_s
wcscpy_s
_set_new_mode
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___argv
__p___argc
_set_fmode
_exit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
__setusermatherr
_set_app_type
_seh_filter_exe
_CrtDbgReportW
_CrtDbgReport
gets
strcmp
__stdio_common_vfprintf
__acrt_iob_func
_seh_filter_dll
kernel32
GetStartupInfoW
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
UnhandledExceptionFilter
GetProcAddress
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
GetModuleHandleW
GetCurrentThreadId
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ