C:\Users\FBG\Desktop\bot project\src\Release\ProcessHollowing.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4974ada82d3128b1d5810f72f25b4244_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4974ada82d3128b1d5810f72f25b4244_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4974ada82d3128b1d5810f72f25b4244_JaffaCakes118
-
Size
285KB
-
MD5
4974ada82d3128b1d5810f72f25b4244
-
SHA1
1782910d2034b27b90f3c885a552f07d0e32fbfc
-
SHA256
51c9f0b5e3082781ce53877b67ab722b31aa93374ca5b5da667750a0d91b8e4b
-
SHA512
a3e7c84d2bd21afe7a2c94974d4aba4d32f1a75897fcd187ceddb22826879410dee3916a677766f8c6d44f3777f8fcaec750953943203b42fa7a02f0a1ca065e
-
SSDEEP
6144:miIivMD4lTvWPO7/N0rfJboN0Br1U4UsPJ0MPheuEkQz:lIivI4ZWPO7FefJboN0BrEsPq0e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4974ada82d3128b1d5810f72f25b4244_JaffaCakes118
Files
-
4974ada82d3128b1d5810f72f25b4244_JaffaCakes118.exe windows:5 windows x86 arch:x86
8b4ed0d955e07accc3de1a27c5632da7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
send
connect
inet_addr
htons
socket
WSAStartup
psapi
GetModuleBaseNameA
advapi32
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
wininet
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
kernel32
EnumSystemLocalesA
GetUserDefaultLCID
GetTimeZoneInformation
SetStdHandle
CreateFileW
SetEndOfFile
GetProcessHeap
IsValidLocale
GetLocaleInfoA
GetStringTypeW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTickCount
QueryPerformanceCounter
OutputDebugStringW
LoadLibraryA
GetProcAddress
ReadProcessMemory
GetFullPathNameA
FindFirstFileA
FindNextFileA
FindClose
WritePrivateProfileStringA
CreateProcessA
CreateFileA
GetFileSize
CompareStringW
GetModuleHandleA
VirtualAllocEx
WriteProcessMemory
GetThreadContext
SetThreadContext
ResumeThread
CreateToolhelp32Snapshot
OpenProcess
Process32First
CloseHandle
TerminateProcess
GetTempPathA
Sleep
CreateThread
ExitProcess
WaitForMultipleObjects
TerminateThread
WriteFile
GetModuleFileNameA
CopyFileA
SetFileAttributesA
GetDriveTypeA
FreeConsole
WriteConsoleW
OutputDebugStringA
HeapCreate
HeapFree
HeapQueryInformation
HeapSize
HeapReAlloc
ReadFile
EnterCriticalSection
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
SetEnvironmentVariableA
LeaveCriticalSection
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetModuleHandleW
GetCurrentProcessId
HeapValidate
IsBadReadPtr
GetModuleFileNameW
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
RaiseException
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetLastError
SetFilePointer
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
GetLocaleInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapAlloc
user32
GetForegroundWindow
GetWindowTextLengthA
GetWindowTextA
MessageBoxA
GetAsyncKeyState
shell32
ShellExecuteA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ