c:\Users\justin\Desktop\asdfdasf\iWorm [C++]\backwards's Hoarder\Debug\backwards's Hoarder.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3093b593a8053d8c8597523f81eb8e46_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3093b593a8053d8c8597523f81eb8e46_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3093b593a8053d8c8597523f81eb8e46_JaffaCakes118
-
Size
132KB
-
MD5
3093b593a8053d8c8597523f81eb8e46
-
SHA1
ed733f35be67cc5c3c282b5285950af178c6ee92
-
SHA256
672f1537d125f45b8943282edbceb50e28e95015514adc62b4155febf754c367
-
SHA512
650c2fb54be78e319b9476d849ccfed2f2c8e676a22dd690ea77b47c513892a498a1386de469f6f363e4519058ec2f843d4c141d2d92160c87bc9e0324b8f7ef
-
SSDEEP
1536:cyqjCCOlUNblyLhFlqP5z/ndBmYVRbx6qtmRL2TkT28JiIrHmVgUJ/3UHdnr5cqI:1PU1YTG1VBXbNjYBJimW3UHdnr57O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3093b593a8053d8c8597523f81eb8e46_JaffaCakes118
Files
-
3093b593a8053d8c8597523f81eb8e46_JaffaCakes118.exe windows:5 windows x86 arch:x86
8c7787473ce13820358066d86a9e87b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
CreateProcessA
MoveFileA
GetTickCount
ExpandEnvironmentStringsA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
ExitProcess
GetLastError
CreateMutexA
SetErrorMode
CopyFileA
GetFileAttributesA
lstrcmpiA
CreateFileA
SetFileAttributesA
GetWindowsDirectoryA
DeleteFileA
GetLocaleInfoW
HeapSize
GetCommandLineA
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryA
WriteFile
GetConsoleCP
GetConsoleMode
GetModuleHandleW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
HeapAlloc
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
FreeLibrary
GetProcessHeap
GetModuleFileNameW
VirtualQuery
GetExitCodeProcess
WaitForSingleObject
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetConsoleCtrlHandler
InterlockedExchange
SetEndOfFile
ReadFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetTimeZoneInformation
advapi32
RegSetValueExA
RegCloseKey
RegCreateKeyExA
urlmon
URLDownloadToFileA
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ