c:\Users\Zogga\Desktop\Stealer\Debug\Password.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4c0d014a2fd10fa66f5615404f8d002f_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
4c0d014a2fd10fa66f5615404f8d002f_JaffaCakes118
-
Size
591KB
-
MD5
4c0d014a2fd10fa66f5615404f8d002f
-
SHA1
3b93e6d4da94a9883919f24add35123d81673a43
-
SHA256
918ea18b366b681c3396c168c1aad8cbe448036c56ee63d33f23484dbf533adb
-
SHA512
ab911031d42c7f4d358d3f18cd411ffc0952d6e2828448c27bdfe8d8809f497a92151619c9d1ec6b2c205bb82f65cfe42e46f3e9d3cefc4df4f0e4642792ca3b
-
SSDEEP
12288:tYTw7M3q3ZBpUfD8S6UR+xFlZx2nLGRVb01zinYAoU:B7bZBpU78kR+ZZxSLGRVA1+e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c0d014a2fd10fa66f5615404f8d002f_JaffaCakes118
Files
-
4c0d014a2fd10fa66f5615404f8d002f_JaffaCakes118.exe windows:5 windows x86 arch:x86
b3c8ebcf1063cee2ef5d5da324960aa8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetCurrentDirectoryA
Sleep
GetLastError
GetCurrentProcess
FreeLibrary
GetDriveTypeA
GetLogicalDriveStringsA
WritePrivateProfileStringA
CopyFileA
GetModuleFileNameA
FindClose
FindNextFileA
SetFileAttributesA
FindFirstFileA
GetWindowsDirectoryA
CloseHandle
GetProcAddress
AllocConsole
GetModuleHandleA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetProcessHeap
SetEndOfFile
GetLocaleInfoW
GetTimeZoneInformation
CreateFileW
GetConsoleOutputCP
WriteConsoleA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CreateFileA
LoadLibraryA
lstrcpyA
lstrcatA
GetPrivateProfileStringA
GetStdHandle
lstrlenA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetDateFormatA
GetTimeFormatA
IsValidCodePage
GetOEMCP
GetACP
VirtualAlloc
HeapReAlloc
HeapSize
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetStdHandle
GetFileType
RtlUnwind
ResumeThread
CreateThread
ExitThread
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
GetCommandLineA
HeapValidate
IsBadReadPtr
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetCPInfo
SetHandleCount
GetStartupInfoA
GetModuleHandleW
ExitProcess
FatalAppExitA
SetLastError
InitializeCriticalSectionAndSpinCount
GetFileAttributesA
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
GetCurrentThread
WriteFile
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointer
FlushFileBuffers
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
VirtualQuery
user32
ShowWindow
FindWindowA
ExitWindowsEx
GetKeyState
MessageBoxA
GetClassNameA
GetWindowTextA
EnumChildWindows
GetWindowThreadProcessId
wsprintfA
SendMessageA
GetAsyncKeyState
GetForegroundWindow
advapi32
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
wininet
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
FtpPutFileA
InternetConnectA
ws2_32
WSAStartup
winmm
mciSendStringA
Sections
.textbss Size: - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 480KB - Virtual size: 479KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ