f:\Documents and Settings\llc\Desktop\Visual Studio Projects\proxystealer\Release\anti-leak.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2d7e8d6e4a2f78857b4bf221e99c5cdf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2d7e8d6e4a2f78857b4bf221e99c5cdf_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d7e8d6e4a2f78857b4bf221e99c5cdf_JaffaCakes118
-
Size
40KB
-
MD5
2d7e8d6e4a2f78857b4bf221e99c5cdf
-
SHA1
ad2f8936f34e9123d8c42d14cf5f657f8347609d
-
SHA256
3fdcec787ee7347aa573b9aa7fbede1383df52f0d65b9eec7411de5f81eadbc7
-
SHA512
fdf8e7ea678d37605999a3c4afe8016793089942ff482d6270e248f8c9b439a798ac2e393388475fa2a49a0110612f0c6dd1b4b582f88017a91fa483a4643760
-
SSDEEP
384:txEkyoAHh2L9EX8T4Z8eq5NhRsbeDPaCuYeJoV4+u8gszwQClvHK8Cfolq:txLy7YaX8SMP5qJoO+u8gszjgvq8Nl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d7e8d6e4a2f78857b4bf221e99c5cdf_JaffaCakes118
Files
-
2d7e8d6e4a2f78857b4bf221e99c5cdf_JaffaCakes118.exe windows:4 windows x86 arch:x86
46faa3c545b98ac90ed31bb5f31218fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeleteFileA
Sleep
GetTickCount
WaitForSingleObject
CreateThread
GetSystemInfo
VirtualProtect
GetLocaleInfoA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
SetStdHandle
GetCPInfo
ExitProcess
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapFree
SetUnhandledExceptionFilter
HeapReAlloc
GetProcAddress
TerminateProcess
GetCurrentProcess
HeapSize
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetFilePointer
LoadLibraryA
InterlockedExchange
VirtualQuery
IsBadCodePtr
GetACP
GetOEMCP
CloseHandle
ws2_32
closesocket
WSAStartup
WSACleanup
htons
inet_addr
gethostbyname
socket
connect
urlmon
URLDownloadToFileA
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE