b:\source\source.IC\31416\Release_WDExe_686\WX\Win32\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0f74aaf5b20af56256512ba193584090_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f74aaf5b20af56256512ba193584090_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0f74aaf5b20af56256512ba193584090_JaffaCakes118
-
Size
192KB
-
MD5
0f74aaf5b20af56256512ba193584090
-
SHA1
0b677fb74f035c2ec59adaf2e1fa08d3262ad514
-
SHA256
4cb3d52bba2a0f25a75d2a364a778b19948fe3ce029118a3d718ad3f04f3c39d
-
SHA512
79a97c8d95e4ee2e000a1a2a1c645e3287609df6e5008c34d7b1d181a3dac4318382d41a6d8ed382efd00089a9bcac7ffb9ad6d963828dfba06dae0ea1d7d920
-
SSDEEP
3072:zt1YSTPpeJ3K9VtV9Zd9VtWvwBlBdmXEZiKxYvwdzycmb1qSqOMNP98kCuqo6fiy:zsAIJ3ZCeX1FvGycMqSbMNFng7iy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f74aaf5b20af56256512ba193584090_JaffaCakes118
Files
-
0f74aaf5b20af56256512ba193584090_JaffaCakes118.exe windows:4 windows x86 arch:x86
7e44be7105bdcd13e51de50674f856ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_except_handler3
_onexit
__dllonexit
isdigit
_snprintf
strncpy
vsprintf
_mbclen
_mbsinc
memcmp
wcscpy
_ismbcspace
realloc
_mbctoupper
_mbspbrk
_mbsrchr
_makepath
_stati64
memmove
_mbsstr
wcscat
wcschr
_mbschr
memchr
_vsnprintf
rand
wcslen
_mbsnbcpy
_mbsnbicmp
sprintf
atoi
strcat
strcpy
_mbscmp
strncmp
_mbsicmp
memcpy
_stricmp
gmtime
time
strlen
free
malloc
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
kernel32
FreeLibrary
RaiseException
GetSystemDefaultLangID
CreateThread
TerminateThread
ResumeThread
CreateProcessA
InterlockedExchange
ReleaseSemaphore
CreateSemaphoreA
MultiByteToWideChar
CompareStringA
WritePrivateProfileStringA
GetCurrentThreadId
TlsFree
TlsAlloc
VirtualProtect
VirtualQuery
TlsGetValue
TlsSetValue
GetFullPathNameA
FindNextFileA
SetFileAttributesA
GetFileAttributesA
FindClose
FindFirstFileA
CreateDirectoryA
CopyFileA
MoveFileA
DeleteFileA
CreateFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
SetErrorMode
SetEndOfFile
FlushFileBuffers
UnlockFileEx
LockFileEx
GetVersion
UnlockFile
LockFile
SetFilePointer
WriteFile
WideCharToMultiByte
GetDriveTypeA
GetVolumeInformationA
GetLogicalDriveStringsA
GetFileInformationByHandle
lstrlenA
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateMailslotA
ExpandEnvironmentStringsA
GetLocalTime
GetComputerNameA
GetProfileStringA
ReadFile
GetExitCodeProcess
GetMailslotInfo
Sleep
GetPrivateProfileStringA
GetPrivateProfileIntA
ExitProcess
GetCommandLineA
LocalFree
GetModuleFileNameA
GetLastError
CreateFileMappingA
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GetModuleHandleA
GetProcAddress
CreateEventA
GetStartupInfoA
MulDiv
LoadLibraryA
SetEvent
FormatMessageA
FindResourceA
LoadResource
LockResource
FreeResource
GetTempPathA
GetTempFileNameA
OpenFileMappingA
CreateMutexA
WaitForSingleObject
ReleaseMutex
GetCurrentProcessId
Exports
Exports
CommandeComposante
DeclareProxy
GeneralParam
LibereMutex
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ