c:\documents and settings\admin\my documents\visual studio 2005\projects\picoware\release\picoware.pdb
Static task
static1
Behavioral task
behavioral1
Sample
25c040589fb5019030d82e14955c526c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
25c040589fb5019030d82e14955c526c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
25c040589fb5019030d82e14955c526c_JaffaCakes118
-
Size
92KB
-
MD5
25c040589fb5019030d82e14955c526c
-
SHA1
14a8aa4b9899c180b15f09cd88309adf41906291
-
SHA256
9096df5827c445de4750837d5cf24233c9fcd611b40c450299db1b7549840da5
-
SHA512
abbc8bdb6a69bce935d5d1b1039cd3aa433f31091f1f7cff2c349ead757f04a046867eb846167ea514325d21bd8abf47347d94c3c4a56a941e0d9d2e415a64ac
-
SSDEEP
1536:lVvLdeQkLzmtC/XMerZk0OG/f9Tcy07/5QAP1:llwNOeb0j5QA9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25c040589fb5019030d82e14955c526c_JaffaCakes118
Files
-
25c040589fb5019030d82e14955c526c_JaffaCakes118.exe windows:4 windows x86 arch:x86
c0d69a1831b19f4d923fb8c088331201
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetReadFile
InternetCloseHandle
InternetQueryDataAvailable
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
netapi32
Netbios
urlmon
URLDownloadToFileA
kernel32
CloseHandle
lstrlenA
LoadResource
LockResource
SizeofResource
FindResourceA
FindResourceExA
GetLastError
InterlockedExchange
GetProcAddress
CompareStringA
GetCurrentProcess
CompareStringW
GetVersionExA
FreeLibrary
SetEvent
Sleep
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryA
LoadLibraryW
GetStringTypeW
GetStringTypeA
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
CreateFileA
FlushFileBuffers
GetThreadLocale
LoadLibraryA
RtlUnwind
InitializeCriticalSection
SetFilePointer
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
VirtualAlloc
GetModuleHandleA
GetTimeZoneInformation
GetLocalTime
HeapReAlloc
GetCommandLineA
GetProcessHeap
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
RaiseException
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
user32
UnregisterClassA
advapi32
RegCreateKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CoTaskMemFree
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ