c:\SborBlocker\Blocker\Release\Blocker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
20ccca718b20ee1744735885f823aab8_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
20ccca718b20ee1744735885f823aab8_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
20ccca718b20ee1744735885f823aab8_JaffaCakes118
-
Size
88KB
-
MD5
20ccca718b20ee1744735885f823aab8
-
SHA1
97d9774dfc5afdc5bfcab1978a0b6c3363bddb44
-
SHA256
8d7171530728cc7e45e9bd48ac4d093debb0cac9d5609b805bf4df92c01ded5a
-
SHA512
3fba459f107204688c9567a34ff3fa2e133223d0bf7ec966fc74ceb192b4b47513cc9ec4a6ad622b88d082d032509b16b80dd7df56d30295fa7b670efecf8236
-
SSDEEP
1536:QRIXnR/ElF9sm+y6aqRbAc96cWrvPKL7Mc/tpt:Q+3RclQ7bAc9iKL7h/tpt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20ccca718b20ee1744735885f823aab8_JaffaCakes118
Files
-
20ccca718b20ee1744735885f823aab8_JaffaCakes118.exe windows:4 windows x86 arch:x86
663d09182be9c48b9834b6668027e9ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetEndOfFile
HeapSize
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
CreateFileA
InitializeCriticalSection
Sleep
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
SetFilePointer
ReadFile
GetModuleHandleW
SystemTimeToFileTime
GetModuleFileNameW
GetSystemTime
CloseHandle
WriteFile
CreateFileW
LoadLibraryExW
GetShortPathNameW
GetSystemDirectoryW
WinExec
SearchPathA
GetShortPathNameA
GetModuleFileNameA
DeleteFileA
GetModuleHandleA
GetCurrentThreadId
LoadLibraryA
GetStringTypeA
GetProcAddress
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
HeapAlloc
GetLastError
HeapFree
GetVersionExA
GetProcessHeap
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
ExitProcess
GetStdHandle
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
user32
ShowWindow
RegisterHotKey
RegisterClassExW
UpdateWindow
GetThreadDesktop
CreateWindowExW
GetClientRect
PostQuitMessage
EndPaint
MessageBoxW
BeginPaint
DefWindowProcW
GetWindowTextW
ReleaseDC
GetWindowLongW
RedrawWindow
LoadCursorW
GetWindowDC
DrawTextW
GetWindowRect
GetDesktopWindow
DispatchMessageW
TranslateMessage
GetMessageW
CloseDesktop
SetTimer
FillRect
SwitchDesktop
SetThreadDesktop
CreateDesktopW
gdi32
GetDIBits
BitBlt
SelectObject
CreateCompatibleDC
SetDIBitsToDevice
CreateCompatibleBitmap
TextOutW
SetTextColor
SetBkMode
CreateFontW
LineTo
MoveToEx
DeleteObject
Rectangle
CreateSolidBrush
CreatePen
DeleteDC
advapi32
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
rpcrt4
UuidToStringW
UuidCreate
RpcStringFreeW
wininet
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
InternetCrackUrlW
InternetReadFile
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ