C:\Users\Julius\Documents\Visual Studio 2010\Projects\XTrap Bypass\Release\XTrap Bypass.pdb
Static task
static1
Behavioral task
behavioral1
Sample
296200fa1c54b3c4e1522c14c3b7c24c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
296200fa1c54b3c4e1522c14c3b7c24c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
296200fa1c54b3c4e1522c14c3b7c24c_JaffaCakes118
-
Size
113KB
-
MD5
296200fa1c54b3c4e1522c14c3b7c24c
-
SHA1
82f198b121007724b0dd9c68feccc90915b919c3
-
SHA256
5c0dbd77b00b70ec82ae4ce58c011a0728fcca6fe9de0523c3d8a93fcbeaba0c
-
SHA512
d61add9eff8f7577242fe87e3af517a6e369c64f081948103fc2be0478b714820996143940f48e91b6c2147f6b6a40646b632d93c20b21142a491000a0d58ef1
-
SSDEEP
1536:N/8qslZqkH4+c8LVV/N+LkIJU5SLLTqHHv/e4MG+uUsYcKuZafW7OBFU:N1slkkY+VGav/7kuUsoOafW7OBFU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 296200fa1c54b3c4e1522c14c3b7c24c_JaffaCakes118
Files
-
296200fa1c54b3c4e1522c14c3b7c24c_JaffaCakes118.exe windows:5 windows x86 arch:x86
3c9bc936e27b1904840b86291ad5617b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetProcAddress
VirtualAllocEx
Process32Next
WritePrivateProfileStringA
VirtualFreeEx
GetCurrentDirectoryA
CreateToolhelp32Snapshot
CloseHandle
GetTempPathA
WriteProcessMemory
GetVolumeInformationA
OpenProcess
GetWindowsDirectoryA
CreateRemoteThread
WaitForSingleObject
GetModuleHandleA
Process32First
GetProcessHeap
SetEndOfFile
LoadLibraryW
WriteConsoleW
SetStdHandle
CreateFileA
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
DeleteFileA
GetCommandLineA
HeapSetInformation
RaiseException
RtlUnwind
HeapFree
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ReadFile
WriteFile
GetConsoleCP
GetConsoleMode
SetFilePointer
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
HeapReAlloc
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CreateFileW
advapi32
CryptDestroyHash
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
GetCurrentHwProfileA
CryptGetHashParam
CryptHashData
shell32
ShellExecuteA
wininet
InternetOpenUrlA
InternetReadFile
InternetOpenA
InternetCloseHandle
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ