c:\SVN\branches\mbamgui.exe\mbamgui.pdb
Static task
static1
Behavioral task
behavioral1
Sample
38e5e205b31e942de2797e88fc06f4eb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
38e5e205b31e942de2797e88fc06f4eb_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
38e5e205b31e942de2797e88fc06f4eb_JaffaCakes118
-
Size
522KB
-
MD5
38e5e205b31e942de2797e88fc06f4eb
-
SHA1
d30f923062e21604037ae0a55165f30573f33375
-
SHA256
e718fdef398ee9276c12516400e810b72825e2ad5d02fde1b2f05acd443f2605
-
SHA512
76fb19b881bab925702e88bb5ca8f59c062c7415bdb214351fba2459f271be5e0003389130033800353cf9cdb7e5c307f1a67c721f1920c30f533655737aafe7
-
SSDEEP
6144:TKi0QZ3wqM2/ItltCl37hstKSLGL3S3aSGtZGtVGGNidJIaGTGK7GspbVGwd82Gi:Tn0Q2qjIDt2rM6W2GZg3gGfrHu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38e5e205b31e942de2797e88fc06f4eb_JaffaCakes118
Files
-
38e5e205b31e942de2797e88fc06f4eb_JaffaCakes118.exe windows:5 windows x86 arch:x86
308601283225e9be841612c67c7f431d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ProcessIdToSessionId
GetCurrentProcessId
FlushFileBuffers
DisconnectNamedPipe
ReadFile
ResetEvent
EnterCriticalSection
GetLastError
LeaveCriticalSection
Sleep
InitializeCriticalSection
GetTickCount
WaitForSingleObject
SetWaitableTimer
CreateMutexW
ExitProcess
CloseHandle
WriteFile
LCMapStringW
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
RtlUnwind
IsValidCodePage
GetOEMCP
GetCPInfo
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetSystemTimeAsFileTime
QueryPerformanceCounter
CreateNamedPipeW
ConnectNamedPipe
CreateThread
GetVersion
OpenEventW
CreateWaitableTimerW
WaitForMultipleObjects
CreateEventW
HeapCreate
ReleaseMutex
SetEvent
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
GetModuleHandleW
OpenProcess
TerminateProcess
GetProcAddress
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
SetFilePointer
CreateFileW
GetFileSizeEx
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
GetACP
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
IsProcessorFeaturePresent
HeapSize
user32
SendMessageW
GetSystemMetrics
MessageBoxW
CreateWindowExW
ShowWindow
SetWindowPos
SetWindowTextW
DefWindowProcW
UpdateWindow
CharUpperW
GetMessageW
TrackPopupMenu
PostMessageW
DeleteMenu
TranslateMessage
AppendMenuW
GetCursorPos
CreatePopupMenu
GetMenuItemCount
CheckMenuItem
DispatchMessageW
EndPaint
DestroyWindow
GetSystemMenu
PostQuitMessage
RegisterWindowMessageW
LoadImageW
SetForegroundWindow
LoadCursorW
DrawEdge
BeginPaint
EnableMenuItem
SystemParametersInfoW
RegisterClassExW
LoadIconW
SetRect
gdi32
DeleteDC
CreateFontIndirectW
DeleteObject
SelectObject
CreateCompatibleDC
GetObjectW
GetStockObject
BitBlt
shell32
ShellExecuteW
Shell_NotifyIconW
comctl32
InitCommonControlsEx
mbam
ord35
ord15
ord12
ord26
ord14
ord33
ord27
ord3
ord21
ord2
ord1
ord32
ord9
mbamnet
ord12
ord10
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 303KB - Virtual size: 303KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.irdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE