C:\inetpub\Temp\7ogb7ejujpo4uu6i3r456v9mm0\Stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3bb0bbe5c3ceb83d9654ca155b086686_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3bb0bbe5c3ceb83d9654ca155b086686_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3bb0bbe5c3ceb83d9654ca155b086686_JaffaCakes118
-
Size
128KB
-
MD5
3bb0bbe5c3ceb83d9654ca155b086686
-
SHA1
49cbb3ea91c1bc562df87a7c147f8682a76cbca7
-
SHA256
2ad6b3b765ba3fe5ec7e5c1c85bba2309440033d47638e81fdca88ae34628487
-
SHA512
172ba4d7dc44c21c9cd42cc2ce81506201827e8545dc8a1431355f7c62f2166097bf7025bb0a3a898f64979a443e62ef5e1e5a61013d7db216770f73f84c7553
-
SSDEEP
3072:5zrl/nonoroxGDi73tCg3qilL42wA52jOMkrcn:5zrl/nonoroxGDFg3qilL42IjOPrc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bb0bbe5c3ceb83d9654ca155b086686_JaffaCakes118
Files
-
3bb0bbe5c3ceb83d9654ca155b086686_JaffaCakes118.exe windows:4 windows x86 arch:x86
84c57526ff79bf269fc1fde55c48bec7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DialogBoxParamA
kernel32
IsValidCodePage
FreeResource
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
GetTickCount
GetThreadContext
GetCurrentThread
LoadLibraryA
GetModuleHandleA
GetProcAddress
IsBadReadPtr
VirtualProtect
VirtualFree
VirtualAlloc
CloseHandle
ReadFile
GetFileSize
CreateFileA
WaitForSingleObject
CreateThread
CreateProcessA
GetStartupInfoA
GetCommandLineA
WriteProcessMemory
VirtualAllocEx
SetThreadContext
ResumeThread
GetVersionExA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
RaiseException
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
Sleep
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
HeapSize
InitializeCriticalSection
RtlUnwind
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ