Y:\Mars\Release\USBExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1b1eb326141d8baeca752d949d049eee_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b1eb326141d8baeca752d949d049eee_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1b1eb326141d8baeca752d949d049eee_JaffaCakes118
-
Size
389KB
-
MD5
1b1eb326141d8baeca752d949d049eee
-
SHA1
6f12866bf2883d212b04ab5d9d23224d61a7d56b
-
SHA256
58b0184938a4fd51a57fa61f5a5f5d306c0ce02df20954cdeedd7c3329352a95
-
SHA512
94cfa6e87821988768a3f6e64f9dead35b2a90867bd3a4bcd9791c685ddfd2ea9859ad0bc965be7b2b5d45af6b4a4b34b56be8eef39f51542d1b96f17dd72010
-
SSDEEP
6144:t5sdHXsoVdYoGvdcN/1nQnnn0XOei1QO6VZx9uY37+UORAc3+L:8HXsoVqdO2nnn/MVIY3qUORAc3+L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b1eb326141d8baeca752d949d049eee_JaffaCakes118
Files
-
1b1eb326141d8baeca752d949d049eee_JaffaCakes118.exe windows:5 windows x86 arch:x86
db9bdf8c7d60a25ee8cbbbbd0ecdd54c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
GetCurrentProcess
GetStdHandle
SetErrorMode
Sleep
GetTempPathA
lstrcmpiA
lstrcpyA
GetSystemTime
SetFileAttributesA
lstrcatA
CopyFileA
TerminateThread
ResumeThread
GetCurrentThreadId
CreateThread
GetModuleFileNameA
OpenMutexA
OpenProcess
GetModuleHandleA
CreateRemoteThread
CreateToolhelp32Snapshot
Thread32First
OpenThread
WaitForSingleObjectEx
Thread32Next
Process32First
Process32Next
GetTickCount
DeleteFileA
VirtualAlloc
VirtualFree
FindResourceA
SizeofResource
LoadResource
WriteFile
FreeLibrary
lstrlenA
GetVersionExA
GetFileAttributesA
GetModuleFileNameW
lstrcpynW
lstrcatW
CreateDirectoryW
SetFileAttributesW
MoveFileExW
DeleteFileW
GetShortPathNameW
GetEnvironmentVariableW
lstrcpyW
SetPriorityClass
SetThreadPriority
GetCurrentThread
GetDriveTypeA
GetLastError
SetFilePointer
CreateFileW
WriteConsoleW
LoadLibraryW
HeapReAlloc
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
SetEndOfFile
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
CreateDirectoryA
CreateProcessA
UnmapViewOfFile
IsBadReadPtr
MapViewOfFile
CloseHandle
CreateFileMappingA
CreateFileA
HeapFree
VirtualAllocEx
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
LockResource
ReadProcessMemory
FreeEnvironmentStringsW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FlushFileBuffers
ReadFile
GetConsoleMode
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
ExitProcess
HeapCreate
IsProcessorFeaturePresent
SetHandleCount
GetConsoleCP
user32
SendMessageA
MessageBoxA
ShowWindow
PostThreadMessageA
DefWindowProcA
PostQuitMessage
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
GetMessageA
advapi32
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptReleaseContext
CryptAcquireContextA
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
CryptDestroyHash
shell32
ShellExecuteA
SHCreateDirectoryExA
ShellExecuteExW
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 303KB - Virtual size: 302KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ