DelTemp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4bdba93d4160bd2c76e242bc5e19cd4f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4bdba93d4160bd2c76e242bc5e19cd4f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4bdba93d4160bd2c76e242bc5e19cd4f_JaffaCakes118
-
Size
88KB
-
MD5
4bdba93d4160bd2c76e242bc5e19cd4f
-
SHA1
c4b3829e8f810cf70fa06aa08b09a2c62dfc8a42
-
SHA256
92ff53168e02f895ef495d681afde52885b9459062b8b34a663a7c43a54bc2a5
-
SHA512
9ba791004a72d7736fe587bda69e770a9d23639482fdd4dcf72ece72b305895c1171cec757d1f3178d1f17b3207a1dd6954825d35ed0c553ec05a201fdb455b0
-
SSDEEP
1536:NmaVNX/ds3MK2319hpdJzj2c8o8ZKWqBJxy1sXEwpx4XJ5L3l4E:NmY62FfFqc8oub1sRpQLy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bdba93d4160bd2c76e242bc5e19cd4f_JaffaCakes118
Files
-
4bdba93d4160bd2c76e242bc5e19cd4f_JaffaCakes118.exe windows:4 windows x86 arch:x86
450c3d7ac3c6d0610a09167108d198ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetThreadPriority
CreateProcessA
CloseHandle
WriteFile
lstrlenA
CreateFileA
GetModuleFileNameA
Sleep
DeleteFileA
SetFileAttributesA
RemoveDirectoryA
FindClose
FindNextFileA
GetCurrentThread
FindFirstFileA
GetPrivateProfileSectionA
WaitForSingleObject
OpenProcess
ReleaseSemaphore
OpenSemaphoreA
SetCurrentDirectoryA
GetTempPathA
GetCurrentProcess
SetPriorityClass
GetFileAttributesA
ResumeThread
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetLastError
GetProcAddress
TerminateProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetACP
GetOEMCP
GetCPInfo
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
HeapAlloc
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
HeapSize
VirtualProtect
GetSystemInfo
VirtualQuery
user32
CharNextA
wsprintfA
GetSystemMetrics
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE