D:\protect\evasion-main\Release\Evasion.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2da554c1d7b4ba0ddc90883f53fd79e9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2da554c1d7b4ba0ddc90883f53fd79e9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2da554c1d7b4ba0ddc90883f53fd79e9_JaffaCakes118
-
Size
2.9MB
-
MD5
2da554c1d7b4ba0ddc90883f53fd79e9
-
SHA1
a6cf1a743568d2ce56ded2e19e1c386f43df3b57
-
SHA256
51da5a3937b869418b183edabda069909e91f4e9fa5aafb34c5285e28ba4b7fd
-
SHA512
d45a43274ab75b51126c589b5fd9b14a49b567e5f7a77ed473135d75705a64bab725a964bf14fa16c3b5cca316d4e697cf3e56a9ee9e175c2ab56995117e1911
-
SSDEEP
49152:X/EWPNBt9jsB8SPU+hqky+4SU0P4deEmS8X3znVtAQSghbcBj+X80WDIHVr:X/EMNZjsS3+hF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2da554c1d7b4ba0ddc90883f53fd79e9_JaffaCakes118
Files
-
2da554c1d7b4ba0ddc90883f53fd79e9_JaffaCakes118.exe windows:6 windows x86 arch:x86
f9c6b0efb226a4c86b2a78621bfd73fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleExW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
DeleteFiber
WideCharToMultiByte
ConvertFiberToThread
CloseHandle
FreeLibrary
TlsFree
FindClose
FindFirstFileW
FindNextFileW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
SetEndOfFile
WriteConsoleW
HeapSize
GetTimeZoneInformation
GetProcessHeap
TlsSetValue
TlsGetValue
TlsAlloc
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
SetLastError
MultiByteToWideChar
GetModuleHandleW
GetLastError
WriteFile
GetFileType
GetEnvironmentVariableW
GetStdHandle
GetStringTypeW
SetEnvironmentVariableW
GetProcAddress
LoadResource
LockResource
LoadLibraryA
FindResourceA
VirtualAlloc
LoadLibraryW
SizeofResource
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
DecodePointer
GetACP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
GetCurrentDirectoryW
SetStdHandle
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
GetConsoleCP
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
EncodePointer
LoadLibraryExW
ExitProcess
SetConsoleCtrlHandler
ReadFile
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
HeapReAlloc
CompareStringW
user32
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
advapi32
CryptCreateHash
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
DeregisterEventSource
CryptDecrypt
CryptExportKey
CryptGetUserKey
bcrypt
BCryptGenRandom
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenStore
ws2_32
closesocket
WSASetLastError
send
recv
WSACleanup
WSAGetLastError
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 350KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ