c:\workarea\8.84\apps\ccc\Source\Utilities\MMPreview\MMCCCPreview\MMPreview\build\B_rel\MMACEPrev.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3c9c7fddd4d6e96a595ea8660935597b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c9c7fddd4d6e96a595ea8660935597b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c9c7fddd4d6e96a595ea8660935597b_JaffaCakes118
-
Size
244KB
-
MD5
3c9c7fddd4d6e96a595ea8660935597b
-
SHA1
97c32c34397dba98431981ad2903333577ba40a1
-
SHA256
5332d4f1d28db41f5dcdb9438a4c5e58ac9fae4a2a02a6de222d82f29e10b629
-
SHA512
54f3c5be83a16cd5a606f7d705e75fcbcd85ecbf2f394fbcfefe0453471666aaaaa8fbf404a57da5f8f9ea08ae09c1609edb7d095161b446384d97f80b0a904b
-
SSDEEP
6144:UFMW0m6pOagpgSUaUl/FCYQ8B575/MCtQUo:UFMW0m2SUa18B57qT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c9c7fddd4d6e96a595ea8660935597b_JaffaCakes118
Files
-
3c9c7fddd4d6e96a595ea8660935597b_JaffaCakes118.exe windows:4 windows x86 arch:x86
5c3aaf929f07b9e40f6e6ba64b80c57d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MultiByteToWideChar
GetLastError
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
Sleep
WideCharToMultiByte
LocalFree
GetTickCount
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
lstrlenA
user32
LoadAcceleratorsA
LoadStringA
DefWindowProcA
PostQuitMessage
DestroyWindow
EndPaint
BeginPaint
ShowWindow
UpdateWindow
PostMessageA
SendMessageA
CreateWindowExA
GetClientRect
RegisterClassExA
LoadCursorA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
gdi32
GetStockObject
ole32
CLSIDFromProgID
CLSIDFromString
CoInitialize
CoTaskMemFree
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
SysAllocString
GetActiveObject
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
msvcr80
_lock
_CIsin
_CIcos
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_controlfp_s
_invoke_watson
_crt_debugger_hook
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
atoi
atof
??3@YAXPAX@Z
??2@YAPAXI@Z
atol
sprintf
free
malloc
__CxxFrameHandler3
_CxxThrowException
memset
_unlock
_encode_pointer
__dllonexit
_CIpow
_onexit
_decode_pointer
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE