P:\_git_\backdoor\release\output\MinSizeRel\backdoor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2f2e27b89d5df847cda977703f425041_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f2e27b89d5df847cda977703f425041_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2f2e27b89d5df847cda977703f425041_JaffaCakes118
-
Size
4.5MB
-
MD5
2f2e27b89d5df847cda977703f425041
-
SHA1
7700eb1907395c177e533bdbdf51e53c876beeef
-
SHA256
2765d071edda82f03f472bd8c859b5fc87e2aacc18e653aed70afccdbfe490d8
-
SHA512
41a71c562832cddd2a387cf447d46b0a1d2888ee9de24b7383d83a1a0749f9345ef6bc877bf4d2c187af98f56e7b95cfba74db2a5038da41e51f84af863a0961
-
SSDEEP
98304:mkGzAk2Me3cfxYhsm2CliJNejrNsvjIdNMaokXlrtyvb/4CQyPWx:mkGZEqbClye3WrIPdogKhHPWx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f2e27b89d5df847cda977703f425041_JaffaCakes118
Files
-
2f2e27b89d5df847cda977703f425041_JaffaCakes118.exe windows:5 windows x86 arch:x86
9e2ad7bb89405788a26987d7007b0fa4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
Sleep
GetTempPathW
GetLastError
GetProcessHeap
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
GetConsoleMode
InterlockedExchangeAdd
InterlockedIncrement
GetFileInformationByHandle
GetFileSize
ReadFile
WriteFile
GetSystemInfo
SetFilePointer
SetEndOfFile
GetFileType
CreateFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
InterlockedDecrement
GetLocaleInfoA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
LCMapStringW
LCMapStringA
GetCPInfo
GetStringTypeA
lstrlenA
CreateFileW
GetModuleFileNameW
FreeEnvironmentStringsW
lstrlenW
GetEnvironmentStringsW
LocalFree
FormatMessageA
GetFileAttributesW
RemoveDirectoryW
DeleteFileW
CopyFileW
GetShortPathNameW
GetCurrentProcess
GetProcAddress
GetModuleHandleW
TerminateProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
VirtualAlloc
LoadLibraryA
GetModuleHandleA
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
HeapFree
HeapAlloc
GetStartupInfoW
HeapReAlloc
SetHandleCount
GetStdHandle
GetStartupInfoA
SetStdHandle
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameA
HeapCreate
HeapDestroy
VirtualFree
HeapSize
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetConsoleCP
winhttp
WinHttpReadData
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpOpen
WinHttpConnect
WinHttpCloseHandle
WinHttpSendRequest
Sections
.text Size: 478KB - Virtual size: 478KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
STLPORT_ Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ