Y:\Mars\Release\USBExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1ab4eff17c498096a8ba64e074b69ad7_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1ab4eff17c498096a8ba64e074b69ad7_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1ab4eff17c498096a8ba64e074b69ad7_JaffaCakes118
-
Size
335KB
-
MD5
1ab4eff17c498096a8ba64e074b69ad7
-
SHA1
966c7596326d6618ccfda911a85fba670b20db71
-
SHA256
30934ce3bc475379cb6621535cc19da58f679c53f7c1c884690f0c2e72bd4cce
-
SHA512
76ef51d50389fb6cb7264e19b02ef9716556b33e8bc492c326ebc74e51c59285ec801cb8f74ac30efd54cdce34118d3c625841ae8b6be673e470fb9131ddb1b1
-
SSDEEP
6144:f5sdHXsoVdwoG/RJdLgN/1nZnnnE9rei1QOI6VYx0Pjs7Ezm8xL:2HXsoVedLSfnnnc26tPY7Ez7L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1ab4eff17c498096a8ba64e074b69ad7_JaffaCakes118
Files
-
1ab4eff17c498096a8ba64e074b69ad7_JaffaCakes118.exe windows:5 windows x86 arch:x86
db9bdf8c7d60a25ee8cbbbbd0ecdd54c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
GetCurrentProcess
GetStdHandle
SetErrorMode
Sleep
GetTempPathA
lstrcmpiA
lstrcpyA
GetSystemTime
SetFileAttributesA
lstrcatA
CopyFileA
TerminateThread
ResumeThread
GetCurrentThreadId
CreateThread
GetModuleFileNameA
OpenMutexA
OpenProcess
GetModuleHandleA
CreateRemoteThread
CreateToolhelp32Snapshot
Thread32First
OpenThread
WaitForSingleObjectEx
Thread32Next
Process32First
Process32Next
GetTickCount
DeleteFileA
VirtualAlloc
VirtualFree
FindResourceA
SizeofResource
LoadResource
WriteFile
FreeLibrary
lstrlenA
GetVersionExA
GetFileAttributesA
GetModuleFileNameW
lstrcpynW
lstrcatW
CreateDirectoryW
SetFileAttributesW
MoveFileExW
DeleteFileW
GetShortPathNameW
GetEnvironmentVariableW
lstrcpyW
SetPriorityClass
SetThreadPriority
GetCurrentThread
GetDriveTypeA
GetLastError
SetFilePointer
CreateFileW
WriteConsoleW
LoadLibraryW
HeapReAlloc
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
SetEndOfFile
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
CreateDirectoryA
CreateProcessA
UnmapViewOfFile
IsBadReadPtr
MapViewOfFile
CloseHandle
CreateFileMappingA
CreateFileA
HeapFree
VirtualAllocEx
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
LockResource
ReadProcessMemory
FreeEnvironmentStringsW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FlushFileBuffers
ReadFile
GetConsoleMode
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
ExitProcess
HeapCreate
IsProcessorFeaturePresent
SetHandleCount
GetConsoleCP
user32
SendMessageA
MessageBoxA
ShowWindow
PostThreadMessageA
DefWindowProcA
PostQuitMessage
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
GetMessageA
advapi32
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptReleaseContext
CryptAcquireContextA
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
CryptDestroyHash
shell32
ShellExecuteA
SHCreateDirectoryExA
ShellExecuteExW
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 249KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ