C:\inetpub\Temp\eg4p52dfeej6mue367v1j8s8t6\Stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1536913d9cd2bfa80da677fab4198523_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
1536913d9cd2bfa80da677fab4198523_JaffaCakes118
-
Size
495KB
-
MD5
1536913d9cd2bfa80da677fab4198523
-
SHA1
6e2d9aa3c5cf0b388ba512e27ece9063f8f14b59
-
SHA256
ce50dda5d30f7290896164891ce6d4abd45b5ae9e76281f98181ab766d77b7eb
-
SHA512
87d4b16beddbd6edc8e70b99db88587c79934cc3b2eb3b686bd6b9c2b94b066c5a5ef34d72b6bd4b9a4e38cb9bffdfdd8ccad30b9009ebf627009928976cce5b
-
SSDEEP
12288:EOT5YNUMYh0HyH+atrR/j88SCXfcT2ROI:ZVYCMkmEdptPcaMI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1536913d9cd2bfa80da677fab4198523_JaffaCakes118
Files
-
1536913d9cd2bfa80da677fab4198523_JaffaCakes118.exe windows:5 windows x86 arch:x86
7cad70903305193e9cdeb615724267ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
GetModuleFileNameExA
kernel32
ReadFile
SetEnvironmentVariableA
GetCurrentProcess
WaitForSingleObject
GetTickCount
GetProcAddress
VirtualProtectEx
LoadLibraryA
GetModuleHandleA
WriteProcessMemory
CreateThread
IsBadReadPtr
VirtualAlloc
GetLastError
HeapFree
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
HeapDestroy
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
EncodePointer
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
MultiByteToWideChar
CloseHandle
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetFileType
CreateFileA
GetCurrentDirectoryW
SetCurrentDirectoryW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
Sleep
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
SetStdHandle
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetDriveTypeW
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
LCMapStringW
HeapReAlloc
GetStringTypeW
WriteConsoleW
CreateFileW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
Sections
.text Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 351KB - Virtual size: 350KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ