C:\Users\Princ\Desktop\Plazma C Private SOurce\Plazma C Private SOurce\Newest\Debug\Plazma.pdb
Static task
static1
Behavioral task
behavioral1
Sample
152445d9d0c3d435b419dd0392651ae3_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
152445d9d0c3d435b419dd0392651ae3_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
152445d9d0c3d435b419dd0392651ae3_JaffaCakes118
-
Size
91KB
-
MD5
152445d9d0c3d435b419dd0392651ae3
-
SHA1
da47d049f8851c3248c33ca6342995d30fcc52b1
-
SHA256
e12bf8bc0837d073f54d4929c9da0b4d81fafd99b38b11497f76aa9e806385ef
-
SHA512
c5a933d44857d4682571b1afa28358cb4eb9e770cf99b59de41fc22c306c5a3e3a6ed7b7644caedbdc0809ab90ee8c65f791e5e90df88e705cb01805b2a98258
-
SSDEEP
1536:2NVFoBRt8uZ2Afx7v1gucSgFuNmE6Q6V7eMu4jsIfZIn+ZoIgI2qEUOb54/4POZ:d2RgOuchFf4+Z8vqEUOb5ZPOZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 152445d9d0c3d435b419dd0392651ae3_JaffaCakes118
Files
-
152445d9d0c3d435b419dd0392651ae3_JaffaCakes118.exe windows:5 windows x86 arch:x86
d48832e7262be27a015ad718027f0d7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemDirectoryA
CreateProcessA
SetFileAttributesA
CopyFileA
GetTempPathA
FreeLibrary
LoadLibraryA
CloseHandle
GlobalUnlock
GlobalLock
FindClose
FindNextFileA
FindFirstFileA
GetComputerNameA
GetVersionExA
GlobalAlloc
Process32Next
Process32First
CreateToolhelp32Snapshot
Module32First
GetCurrentProcessId
ExitThread
TerminateProcess
OpenProcess
WritePrivateProfileStringA
GetFileAttributesA
GetLogicalDriveStringsA
GetPrivateProfileStringA
ReleaseMutex
GetTickCount
lstrlenW
LocalFree
VirtualQuery
GetModuleFileNameW
GetProcessHeap
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
DecodePointer
ExitProcess
CreateMutexA
GetLastError
Sleep
DeleteFileA
CreateThread
ExpandEnvironmentStringsA
GetLocaleInfoA
lstrlenA
CreateFileA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
ReadProcessMemory
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LoadLibraryW
MultiByteToWideChar
IsDebuggerPresent
WideCharToMultiByte
RaiseException
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
GetDriveTypeA
GetModuleFileNameA
user32
ExitWindowsEx
FindWindowA
CloseClipboard
GetClipboardData
SetClipboardData
EmptyClipboard
VkKeyScanW
keybd_event
SetFocus
SetForegroundWindow
BlockInput
OpenClipboard
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
OpenProcessToken
LookupPrivilegeValueA
GetUserNameA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
SetErrorInfo
GetErrorInfo
VariantChangeType
CreateErrorInfo
ws2_32
connect
getsockopt
sendto
ioctlsocket
WSACleanup
closesocket
recv
WSAStartup
inet_ntoa
gethostbyname
socket
htons
inet_addr
send
gethostbyaddr
getsockname
wininet
InternetCloseHandle
InternetGetConnectedState
InternetOpenA
InternetOpenUrlA
InternetReadFile
iphlpapi
IcmpSendEcho
IcmpCreateFile
IcmpCloseHandle
msvcr100
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_controlfp_s
_CxxThrowException
??3@YAXPAX@Z
_invoke_watson
rand
strstr
strcmp
strcpy
strtok
memset
strlen
strncpy
free
sprintf
strcat
malloc
__argv
srand
atoi
_pclose
fgets
feof
_popen
fclose
fopen
_snprintf
strchr
_vsnprintf
_stricmp
fprintf
fwrite
strncat
isalpha
_wassert
_strrev
memcpy
_CRT_RTC_INITW
_except_handler4_common
_amsg_exit
__getmainargs
_cexit
_exit
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ