d:\programming\work\runexpl\runexpl\Release\smphost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3f39f52b1e6662967a800cbc6600a9d1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3f39f52b1e6662967a800cbc6600a9d1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f39f52b1e6662967a800cbc6600a9d1_JaffaCakes118
-
Size
152KB
-
MD5
3f39f52b1e6662967a800cbc6600a9d1
-
SHA1
235d738993bb63c99701de1f0fa3988dadebec11
-
SHA256
f72d56d6134398205f3cdac52ac99203727a5ab51d911a50421f612914362c29
-
SHA512
e6e72715311cc606f272e9194e6a06d47e3f8dd616f8dced8a3de9e3135aede8e9abb6eab4bcc401248f87c699a878316b75d5f77137c016a247c0e2065287b5
-
SSDEEP
1536:aXgvZBWUMgjgvAcOw8LrtiPGbtxKBov3F0HTH1tD7sRwrH39tIp1pkd:aMw8PLb8b7sRYX9tIp1pkd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f39f52b1e6662967a800cbc6600a9d1_JaffaCakes118
Files
-
3f39f52b1e6662967a800cbc6600a9d1_JaffaCakes118.exe windows:4 windows x86 arch:x86
6a6f0f7a1e053c390fe517ff8f622ba0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileSize
ReadFile
CloseHandle
CreateProcessA
GetModuleFileNameW
CreateFileW
GetVersionExA
GetACP
Sleep
CreateProcessW
GetTickCount
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
RaiseException
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
LoadLibraryA
InitializeCriticalSection
RtlUnwind
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
WideCharToMultiByte
LCMapStringW
user32
GetActiveWindow
GetKeyboardState
advapi32
RegSetValueExW
RegCreateKeyExW
GetUserNameW
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ