c:\Documents and Settings\dhz\桌面\netboy\release\server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2f5c8c61da69d4e79eaaae7f8ce4b310_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f5c8c61da69d4e79eaaae7f8ce4b310_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2f5c8c61da69d4e79eaaae7f8ce4b310_JaffaCakes118
-
Size
172KB
-
MD5
2f5c8c61da69d4e79eaaae7f8ce4b310
-
SHA1
134555d80bacee7aaf069035619e27e5d99ea096
-
SHA256
84f7ebfa56315c623e2538751f0b89984a6957d095eedb622a7372538e2f526e
-
SHA512
7ca97db6e958dacccad0d308152f41a45c0c9a3e4b17ac816f6aff465f0b5cb96ad225b5c95956bcb1ae2c0dd0b90306c2835685f466047522ae43f7564f8234
-
SSDEEP
3072:Nl5/xGfC/zGDnxqDK2sx03KFeIvRBwmWeRtSbe:RxUxh2sx0anRBDWe+be
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f5c8c61da69d4e79eaaae7f8ce4b310_JaffaCakes118
Files
-
2f5c8c61da69d4e79eaaae7f8ce4b310_JaffaCakes118.exe windows:4 windows x86 arch:x86
93c6ca550b712069e7e161bb8c9d3ff0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
gethostbyname
connect
recvfrom
sendto
htons
inet_addr
WSAGetLastError
socket
WSAStartup
WSACleanup
closesocket
send
recv
kernel32
GetDriveTypeA
CreateDirectoryA
CreateMutexA
GetLastError
WaitForSingleObject
ReleaseMutex
CreateThread
CloseHandle
GetCurrentProcess
WinExec
WriteFile
TerminateProcess
CreatePipe
CreateProcessA
ReadFile
FindClose
Sleep
GetComputerNameA
GetWindowsDirectoryA
GetModuleFileNameA
LoadLibraryA
FreeLibrary
GetLogicalDriveStringsA
GetVolumeInformationA
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FindFirstFileA
GetLocalTime
GetSystemDirectoryA
GetCurrentProcessId
GetSystemTimeAsFileTime
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileW
GetLocaleInfoW
SetEndOfFile
GetModuleHandleA
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
WideCharToMultiByte
GetProcAddress
ExitProcess
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCPInfo
SetHandleCount
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointer
FlushFileBuffers
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetACP
GetOEMCP
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
user32
LoadStringA
ExitWindowsEx
advapi32
RegSetValueExA
RegOpenKeyA
ControlService
StartServiceA
QueryServiceStatus
ChangeServiceConfigA
CloseServiceHandle
CreateServiceA
OpenServiceA
OpenSCManagerA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ