d:\Documents and Settings\diego.pastor.vicente\Desktop\TEMP\post pen\insider2 simple\Release\insider2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3491769bfbec7e4acab808f44c37a7f3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3491769bfbec7e4acab808f44c37a7f3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3491769bfbec7e4acab808f44c37a7f3_JaffaCakes118
-
Size
96KB
-
MD5
3491769bfbec7e4acab808f44c37a7f3
-
SHA1
bc7ae9cb65b6d73e96eb557b7db456419cc79b6c
-
SHA256
386e7ee1b96f06eac295dc4910de45c0e8a72ef5361f6a797d4ba2f540eba556
-
SHA512
c9edf6435cfe267883f01b8a5aa8449405e41302e23d51d1a512180ed07a3fdfb6ad4bc32dfeccb5665509ae6211a7b30d70e371c085b13b597035e16f91e2a6
-
SSDEEP
1536:umg9IcdfEYa43qI/dY4kyy8b1PNV0PKD/Bu8t:uV9IcdcY/Ey14e/Bu8t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3491769bfbec7e4acab808f44c37a7f3_JaffaCakes118
Files
-
3491769bfbec7e4acab808f44c37a7f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
56024889ff5533d418c37e76de0d5394
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetErrorDlg
advapi32
SetSecurityDescriptorDacl
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
InitializeSecurityDescriptor
user32
GetDesktopWindow
PostThreadMessageA
GetMessageA
kernel32
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
TerminateProcess
GetStringTypeW
GetStringTypeA
ReadFile
PeekNamedPipe
GetExitCodeProcess
CloseHandle
CreateProcessA
GetStartupInfoA
CreatePipe
GetVersionExA
SetProcessWorkingSetSize
GetCurrentProcess
Sleep
GetCurrentThreadId
CopyFileA
GetModuleFileNameA
GetModuleHandleA
GetLastError
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
HeapFree
GetProcAddress
ExitProcess
HeapReAlloc
GetCommandLineA
GetProcessHeap
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
WriteFile
GetStdHandle
GetFullPathNameA
GetCurrentDirectoryA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
LoadLibraryA
InitializeCriticalSection
MultiByteToWideChar
RtlUnwind
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapSize
GetLocaleInfoA
SetStdHandle
SetFilePointer
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
Sections
.text Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ