e:\My Documents\Visual Studio Projects\NetMonitor\Monitor\Release\Monitor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
487b70c865035e1e29e0ce14837ba97b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
487b70c865035e1e29e0ce14837ba97b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
487b70c865035e1e29e0ce14837ba97b_JaffaCakes118
-
Size
81KB
-
MD5
487b70c865035e1e29e0ce14837ba97b
-
SHA1
31a7feb97d6fc9ea131eceee2361839a3279914d
-
SHA256
1023d677c39f824009c534001582375ed8f8fbdb7226deb52f0ed05dd053f69e
-
SHA512
47c667ce00fdf5307725cbe009a2c139fc7a50511edb77c39cfad9fe57ad4ae4b13ab9f0cee8a77bcdd2ce2e22a39be8c3341a014618f5d594f2f81144849e5f
-
SSDEEP
1536:JVfIO96T4nOBnvaAN3U/Pbw70KpzZKCabg/2ARY9GGFqlp7:/znMCkaDw73KCCg7R4GGqlJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 487b70c865035e1e29e0ce14837ba97b_JaffaCakes118
Files
-
487b70c865035e1e29e0ce14837ba97b_JaffaCakes118.exe windows:4 windows x86 arch:x86
2be1967123be1a764da5425e765b15cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
gethostbyname
WSACleanup
WSAStartup
gethostname
recv
sendto
select
recvfrom
bind
inet_addr
socket
htons
connect
inet_ntoa
closesocket
send
kernel32
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
GetSystemInfo
VirtualProtect
LCMapStringW
MultiByteToWideChar
LCMapStringA
IsBadCodePtr
_lclose
_lwrite
_lcreat
CloseHandle
SetFileTime
SystemTimeToFileTime
CreateFileA
SetEvent
WaitForSingleObject
GetTickCount
ResetEvent
CreateThread
CreateEventA
CopyFileA
GetLastError
GetDriveTypeA
DeleteFileA
GetLocalTime
_llseek
SetFileAttributesA
_lopen
Sleep
CreateMutexA
MoveFileA
GetModuleFileNameA
GetSystemDirectoryA
GetWindowsDirectoryA
_lread
IsBadReadPtr
VirtualQuery
InterlockedExchange
LoadLibraryA
SetFilePointer
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetStringTypeA
GetLocaleInfoA
GetStringTypeW
ReadFile
FlushFileBuffers
HeapSize
GetLogicalDriveStringsA
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
HeapAlloc
SetUnhandledExceptionFilter
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
user32
DefWindowProcA
DispatchMessageA
KillTimer
SetTimer
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
PostQuitMessage
gdi32
GetStockObject
advapi32
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
RegCloseKey
shell32
ShellExecuteA
ole32
CoCreateInstance
CoTaskMemFree
CoInitialize
CoUninitialize
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE