C:\inetpub\Temp\7ogb7ejujpo4uu6i3r456v9mm0\Stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118
-
Size
128KB
-
MD5
1b80613ac090d4eecfdd6554d4290b7b
-
SHA1
52ee1d680eb6394897e5854027f2eadc76acba2e
-
SHA256
f7f8376c3a4289f5ba02262cad0889c8f8572b0dac37226e37e71132a20ed825
-
SHA512
c2399e167628b579addfea8250ea63475f70bafc51c2bca4d0bc4fe2d82e7623ac008e1121f805a3a082ca8d4db4286450cfe61abc7d7f43cb1c84a0bf834d95
-
SSDEEP
3072:5zrl/nonoroxGDi73tCg3qilL42wA52jOMkrc0:5zrl/nonoroxGDFg3qilL42IjOPrD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118
Files
-
1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe windows:4 windows x86 arch:x86
84c57526ff79bf269fc1fde55c48bec7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DialogBoxParamA
kernel32
IsValidCodePage
FreeResource
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
GetTickCount
GetThreadContext
GetCurrentThread
LoadLibraryA
GetModuleHandleA
GetProcAddress
IsBadReadPtr
VirtualProtect
VirtualFree
VirtualAlloc
CloseHandle
ReadFile
GetFileSize
CreateFileA
WaitForSingleObject
CreateThread
CreateProcessA
GetStartupInfoA
GetCommandLineA
WriteProcessMemory
VirtualAllocEx
SetThreadContext
ResumeThread
GetVersionExA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
RaiseException
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
Sleep
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
HeapSize
InitializeCriticalSection
RtlUnwind
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ