H:\OlTRRYXYkaO921jYkGv2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
35df52fe2ecc79ca388df089c82e21de_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35df52fe2ecc79ca388df089c82e21de_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35df52fe2ecc79ca388df089c82e21de_JaffaCakes118
-
Size
257KB
-
MD5
35df52fe2ecc79ca388df089c82e21de
-
SHA1
e11b79fffecf4fc688caa3dd2d073dba2a6ac688
-
SHA256
50af7e320eb53a043708eb5a4bfdf153c3c18f8a13e3c58922e44631cc35483e
-
SHA512
59f8fa4d644a501271ed8f23db4aa24f5345bac44d407749fb6902ea0a486f4059077b1f9970e92002a0c2a56674a27bc6a93e0f5e3b7f9020ca28bedcfc196d
-
SSDEEP
3072:YcKB9ZI5dz7kKRrONmypsHpU3m0sa7gg8OjKxXSDOiEQzQr1Yk2kdS27:YpB9ZI5dnkurYoS7gg1eE/ciudSc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35df52fe2ecc79ca388df089c82e21de_JaffaCakes118
Files
-
35df52fe2ecc79ca388df089c82e21de_JaffaCakes118.exe windows:5 windows x86 arch:x86
2db1fb6c1818b19eacd6aad2e98c7353
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
GetTickCount
EnumSystemLocalesA
GetLocaleInfoA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
RaiseException
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
LoadLibraryW
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
FreeLibrary
HeapAlloc
GetProcessHeap
VirtualQuery
FatalAppExitA
SetConsoleCtrlHandler
InterlockedExchange
GetLocaleInfoW
RtlUnwind
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
HeapReAlloc
HeapSize
CreateFileW
CloseHandle
FlushFileBuffers
GetUserDefaultLCID
IsValidLocale
user32
wsprintfA
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ