C:\a_programing\.main\newproject\#\next\next\Release\next.pdb
Static task
static1
Behavioral task
behavioral1
Sample
40fa49e922e50255f8aef7ccaa63eba9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40fa49e922e50255f8aef7ccaa63eba9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
40fa49e922e50255f8aef7ccaa63eba9_JaffaCakes118
-
Size
126KB
-
MD5
40fa49e922e50255f8aef7ccaa63eba9
-
SHA1
0642a3e81ab4d55f5a800659bef214852e5589e0
-
SHA256
0a7add2b974567d245e7c7fd8082c9ba961622eb3d07af8c31953947117ae5df
-
SHA512
b91ca65a4b6a8606261af4fdb609a0d4063a6afdb3b06b2dae8c7dfcda46a9f839343bf1d55567ead4112533cf0e5f9201f3068c8312f26dfe097e25c560f565
-
SSDEEP
3072:YAs6NJIpIVkvMHKgh24GhWQ3QhjDdLN3XTvgIQ8:N9k3Me4G+1rTYIQ8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40fa49e922e50255f8aef7ccaa63eba9_JaffaCakes118
Files
-
40fa49e922e50255f8aef7ccaa63eba9_JaffaCakes118.exe windows:6 windows x86 arch:x86
1039f390fb791140e63702f651471dcb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DecodePointer
DeleteCriticalSection
HeapAlloc
GetConsoleMode
GetConsoleOutputCP
RaiseException
CloseHandle
HeapReAlloc
DeleteFileA
GetLastError
HeapSize
InitializeCriticalSectionEx
GetUserDefaultLangID
GetCurrentProcess
GetProcessHeap
HeapFree
FlushFileBuffers
SetFilePointerEx
GetTimeZoneInformation
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
CreateEventW
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameW
GetStdHandle
WriteFile
GetCurrentDirectoryW
GetFullPathNameW
MultiByteToWideChar
CompareStringW
LCMapStringW
SetStdHandle
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetStringTypeW
WriteConsoleW
user32
MessageBoxA
advapi32
AdjustTokenPrivileges
RegCloseKey
LookupPrivilegeValueA
RegCreateKeyExA
RegUnLoadKeyA
RegSetValueExA
OpenProcessToken
RegLoadKeyA
RegOpenKeyExA
RegEnumKeyExA
shell32
ShellExecuteA
shlwapi
PathFileExistsA
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ