x:\Dev_CPP\Work\VS_KnzStr_Adware\Release\VS_Work4.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1885988dba142a10842106228d165e0f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1885988dba142a10842106228d165e0f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1885988dba142a10842106228d165e0f_JaffaCakes118
-
Size
74KB
-
MD5
1885988dba142a10842106228d165e0f
-
SHA1
10ccb973c96b328b8bed0974f44eff1825f5b506
-
SHA256
d16a3fb737669bd8bf18a39d38c78a344c59f9e2c306adaf0c89a7e68a9c3f1e
-
SHA512
cecb5eb5fec8a943f720c17c456de4e39d531229522c62bcb18ae1adde617987f07bb37e13bbc3b08a6ea2472ee3b55a76f2d59046cd5994445d1a5b89cc2c71
-
SSDEEP
1536:FHRUmPBG6RJHmiA84oNMj8eR/iUTK5BBWfkkfEl:v1ekEaf5Bek1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1885988dba142a10842106228d165e0f_JaffaCakes118
Files
-
1885988dba142a10842106228d165e0f_JaffaCakes118.exe windows:5 windows x86 arch:x86
bb59873cfc61dbd6af5b116861f5b285
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
lstrcpyA
lstrcatA
lstrcmpA
CreateMutexA
GetLastError
Sleep
CloseHandle
ExpandEnvironmentStringsA
CreateProcessA
TerminateProcess
GetFileAttributesA
GetModuleFileNameA
WinExec
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SetEndOfFile
SetFilePointer
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RaiseException
HeapFree
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
VirtualAlloc
HeapReAlloc
CreateFileA
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
MultiByteToWideChar
ReadFile
LCMapStringA
LCMapStringW
user32
DispatchMessageA
TranslateMessage
GetMessageA
AppendMenuA
CreatePopupMenu
CreateWindowExA
RegisterClassExA
LoadCursorA
DefWindowProcA
PostMessageA
TrackPopupMenuEx
SetForegroundWindow
GetCursorPos
PostQuitMessage
SetTimer
MessageBoxA
KillTimer
CharUpperA
LoadIconA
shell32
Shell_NotifyIconA
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ