H:\Double\Door_wh\RbDoorX64\x64\Release\RbDoorX64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
15d6249e0e7e03b3e00cc3917431cf64_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
15d6249e0e7e03b3e00cc3917431cf64_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
15d6249e0e7e03b3e00cc3917431cf64_JaffaCakes118
-
Size
577KB
-
MD5
15d6249e0e7e03b3e00cc3917431cf64
-
SHA1
a8b95082c60f3c6bca3f0c5c11cff17db49f2d6b
-
SHA256
6fd47d689537c5769ccb8eccdd541e3501789973701d91cbaad3883a875cb8e7
-
SHA512
69540acf393a92381acd9fea975a3155646e7c8b6bbf886fc5babc2de1824faba4a7ad11dbfa132f187482de16af8762aa60562f6eac36a955594c33ecc78147
-
SSDEEP
12288:c+eRnslKxaXDKt1VT7B5vrrhJ4TjWRMfSgSOUtZnoGz:c+eRnsl6aTKt1xHr1J4mIJ6Znp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15d6249e0e7e03b3e00cc3917431cf64_JaffaCakes118
Files
-
15d6249e0e7e03b3e00cc3917431cf64_JaffaCakes118.exe windows:5 windows x64 arch:x64
48e28d1a984d6b5a99349353710a92d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
WriteFile
SetEndOfFile
CreateToolhelp32Snapshot
VirtualAllocEx
GetProcAddress
GetModuleHandleW
GetCurrentProcess
CreateRemoteThread
LoadLibraryA
VirtualFreeEx
WaitForSingleObject
SetLastError
CloseHandle
ReadProcessMemory
OpenProcess
GetLastError
Process32FirstW
Process32NextW
FlushFileBuffers
GetModuleFileNameA
DeleteFileA
GetTempPathA
GetTempFileNameA
CreateFileA
SetFileAttributesA
GetModuleFileNameW
SetFileAttributesW
ReadFile
SetFilePointer
GetModuleHandleA
CreateFileW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
GetCurrentThreadId
FlsAlloc
Sleep
ExitProcess
GetStdHandle
RtlUnwindEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
HeapFree
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapReAlloc
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 521KB - Virtual size: 529KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ