C:\inetpub\Temp\7ogb7ejujpo4uu6i3r456v9mm0\Stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3d7b375dbd1819eee16d3f410a9d2cf5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3d7b375dbd1819eee16d3f410a9d2cf5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d7b375dbd1819eee16d3f410a9d2cf5_JaffaCakes118
-
Size
128KB
-
MD5
3d7b375dbd1819eee16d3f410a9d2cf5
-
SHA1
e360da788e2f2fbb5020dbb4405d369314dc9dfa
-
SHA256
18594809f6c3c9e569e13f135265ecafa4bee2482765b4f561258f2f408c09a0
-
SHA512
740f2ba6716313ee00130915b41da3987716df0f7bc716a987f6008dbcc355766313c5f9584404e77b6a53309165d0e0f8d485bcfccc035545a6684a454f36cc
-
SSDEEP
3072:5zrl/nonoroxGDi73tCg3qilL42wA52jOMkrcI:5zrl/nonoroxGDFg3qilL42IjOPrX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d7b375dbd1819eee16d3f410a9d2cf5_JaffaCakes118
Files
-
3d7b375dbd1819eee16d3f410a9d2cf5_JaffaCakes118.exe windows:4 windows x86 arch:x86
84c57526ff79bf269fc1fde55c48bec7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DialogBoxParamA
kernel32
IsValidCodePage
FreeResource
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
GetTickCount
GetThreadContext
GetCurrentThread
LoadLibraryA
GetModuleHandleA
GetProcAddress
IsBadReadPtr
VirtualProtect
VirtualFree
VirtualAlloc
CloseHandle
ReadFile
GetFileSize
CreateFileA
WaitForSingleObject
CreateThread
CreateProcessA
GetStartupInfoA
GetCommandLineA
WriteProcessMemory
VirtualAllocEx
SetThreadContext
ResumeThread
GetVersionExA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
RaiseException
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
Sleep
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
HeapSize
InitializeCriticalSection
RtlUnwind
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ