C:\Users\what\Documents\Visual Studio 2008\Projects\reboot\Debug\reboot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
14cf9a43c951642bf5e1c5176aad7668_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
14cf9a43c951642bf5e1c5176aad7668_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
14cf9a43c951642bf5e1c5176aad7668_JaffaCakes118
-
Size
288KB
-
MD5
14cf9a43c951642bf5e1c5176aad7668
-
SHA1
4615abe3c3cca8d01ff88fb13f6a6b092c65a3ac
-
SHA256
c01f24b1a8b92b08b35db5daf86e6921f04864144e9536aae36534a60646c9d4
-
SHA512
839b9337a964b7a3934805ead5037503f3ba247b24b19e5dedbd622184095b76aa2db9e356c5a7d39afd41235016b5c271b8a85becfafda64d9b64d9d2623d4e
-
SSDEEP
3072:UTGtqoioR6u1YihiPhSTvUAlcq5dzXyQEDnctr4ZPDoIjZDlJk:1tH6u1y4E6zXyQEDnctr4ZPDoIjZJJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14cf9a43c951642bf5e1c5176aad7668_JaffaCakes118
Files
-
14cf9a43c951642bf5e1c5176aad7668_JaffaCakes118.exe windows:5 windows x86 arch:x86
12d9c8180d3a4b9806967bafbc00a115
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
OpenProcess
lstrlenA
CreateRemoteThread
LoadLibraryA
GetVersionExA
Process32Next
GetProcAddress
CreateToolhelp32Snapshot
GetCurrentProcess
CompareStringW
CompareStringA
GetTimeZoneInformation
FlushFileBuffers
CreateFileA
GetLocaleInfoW
HeapSize
WaitForSingleObject
CloseHandle
Process32First
GetCurrentDirectoryA
GetCommandLineA
GetStartupInfoA
RaiseException
IsDebuggerPresent
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeLibrary
HeapAlloc
GetProcessHeap
GetModuleFileNameW
VirtualQuery
SetFilePointer
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FatalAppExitA
SetConsoleCtrlHandler
InterlockedExchange
InitializeCriticalSectionAndSpinCount
VirtualAlloc
HeapReAlloc
RtlUnwind
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetEnvironmentVariableA
user32
FindWindowA
LoadCursorA
LoadIconA
RegisterClassA
CreateWindowExA
DefWindowProcA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ