P:\_git_\backdoor\release\output\MinSizeRel\backdoor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2be1e6d2f7a2cc97b87008041d103b57_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2be1e6d2f7a2cc97b87008041d103b57_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2be1e6d2f7a2cc97b87008041d103b57_JaffaCakes118
-
Size
9.7MB
-
MD5
2be1e6d2f7a2cc97b87008041d103b57
-
SHA1
df37d6319d51ca27d0cea26bdc231a1428eca2a7
-
SHA256
ce667edf90a8c09e102514b387b79b84f9f1b9a32e79041f769e95bf13e9e825
-
SHA512
86f238fdbfab4949eebab609ba7633fb31c31cfa9b9939978620448fafae8e94b13058914acecfbe439af53cd694f0747da968329693d3c5ef9bb38e11808bfa
-
SSDEEP
196608:mkGZg7rqnoZu72fWc2w7aWtr5sZLDKveiCHQkTANuAtT1AYR:mkGS7rqAu7bwu48aebANuIT1A0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2be1e6d2f7a2cc97b87008041d103b57_JaffaCakes118
Files
-
2be1e6d2f7a2cc97b87008041d103b57_JaffaCakes118.exe windows:5 windows x86 arch:x86
9e2ad7bb89405788a26987d7007b0fa4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
Sleep
GetTempPathW
GetLastError
GetProcessHeap
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
GetConsoleMode
InterlockedExchangeAdd
InterlockedIncrement
GetFileInformationByHandle
GetFileSize
ReadFile
WriteFile
GetSystemInfo
SetFilePointer
SetEndOfFile
GetFileType
CreateFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
InterlockedDecrement
GetLocaleInfoA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
LCMapStringW
LCMapStringA
GetCPInfo
GetStringTypeA
lstrlenA
CreateFileW
GetModuleFileNameW
FreeEnvironmentStringsW
lstrlenW
GetEnvironmentStringsW
LocalFree
FormatMessageA
GetFileAttributesW
RemoveDirectoryW
DeleteFileW
CopyFileW
GetShortPathNameW
GetCurrentProcess
GetProcAddress
GetModuleHandleW
TerminateProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
VirtualAlloc
LoadLibraryA
GetModuleHandleA
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
HeapFree
HeapAlloc
GetStartupInfoW
HeapReAlloc
SetHandleCount
GetStdHandle
GetStartupInfoA
SetStdHandle
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameA
HeapCreate
HeapDestroy
VirtualFree
HeapSize
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetConsoleCP
winhttp
WinHttpReadData
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpOpen
WinHttpConnect
WinHttpCloseHandle
WinHttpSendRequest
Sections
.text Size: 478KB - Virtual size: 478KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
STLPORT_ Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ