c:\Users\Kyle\Desktop\TestMeta\2003\Output\Release\e32b54y87qb49p67b6.pdb
Static task
static1
Behavioral task
behavioral1
Sample
492d5bb992dd4e7aaa359eac48b988eb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
492d5bb992dd4e7aaa359eac48b988eb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
492d5bb992dd4e7aaa359eac48b988eb_JaffaCakes118
-
Size
248KB
-
MD5
492d5bb992dd4e7aaa359eac48b988eb
-
SHA1
4b2ec6d17c476ed052463e536d60609877bc5bf8
-
SHA256
daa2e138603779fcc95601a36332077df4b6c5bd7a841937b144afe1c81bec48
-
SHA512
eecd5f99e16109a70ee6a97b543d148c25389356a9c3e81e008325648824c05a44f3d33b2213c98b150d22df6d325ffd834fedd776603afc1a728816cc9c1963
-
SSDEEP
6144:4gxCSvysJmdJAu9aPmXc/y1aqTy8nQH1p/GA0NdS1WhJjh:jxh6sJu1XcqcqLQH1Q9iUJd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 492d5bb992dd4e7aaa359eac48b988eb_JaffaCakes118
Files
-
492d5bb992dd4e7aaa359eac48b988eb_JaffaCakes118.exe windows:4 windows x86 arch:x86
900484562eac952acb54c01e40db8af1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
lstrlenA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
user32
wsprintfA
msvcr71
_except_handler3
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
__security_error_handler
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
??3@YAXPAX@Z
atoi
malloc
free
memset
_amsg_exit
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE