C:\Users\Administrator\Desktop\Proiect INTERWAP\Release\New.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4d4d2e1629b4fa261beb3889241d8b2c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d4d2e1629b4fa261beb3889241d8b2c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d4d2e1629b4fa261beb3889241d8b2c_JaffaCakes118
-
Size
251KB
-
MD5
4d4d2e1629b4fa261beb3889241d8b2c
-
SHA1
2fdea18a3449d667af9f2b5d39778e3cca568e83
-
SHA256
1b693a592876d50054d5b040d3240a76aa75ff897aca3599c2e615a8a085c64a
-
SHA512
5fa9e89f824460280c431ef7160af85dfd59d247be463958c640e30f90b7a99000a968d211f0dcf23afe468e95966fa22c5ad3b1f7387f173978641c7ec1e595
-
SSDEEP
3072:c4BImrbo+g2HiwKBnEQqXUGCojRwcW2K2G14TW9jaPHpc75i7jUDmVu1Rm:c269wsnEQqXFCojJc1X9Gd7jMm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d4d2e1629b4fa261beb3889241d8b2c_JaffaCakes118
Files
-
4d4d2e1629b4fa261beb3889241d8b2c_JaffaCakes118.exe windows:5 windows x86 arch:x86
0375b8f576bb58b9db979600d488c558
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RtlUnwind
ExitThread
CreateThread
HeapReAlloc
RaiseException
VirtualAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetErrorMode
GetOEMCP
GetCPInfo
GetModuleHandleW
CreateFileA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
FormatMessageA
LocalFree
MulDiv
MultiByteToWideChar
GetCurrentProcessId
GlobalAddAtomA
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
lstrlenA
SetLastError
GlobalUnlock
GlobalFree
FreeResource
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetModuleHandleA
GetProcAddress
lstrcpynA
ReadFile
CloseHandle
GetLastError
CreatePipe
TerminateProcess
TerminateThread
GetSystemTime
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
Sleep
FreeEnvironmentStringsW
CreateProcessA
user32
GetSysColorBrush
LoadCursorA
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
GetDlgItemInt
CheckDlgButton
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
GetWindowPlacement
GetWindowRect
GetWindow
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
UnregisterClassA
MapWindowPoints
GetMenuState
EnableMenuItem
CheckMenuItem
GetSysColor
SystemParametersInfoA
DestroyMenu
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
PostQuitMessage
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
LoadIconA
SendMessageA
EnableWindow
GetDlgItem
SetDlgItemTextA
PostMessageA
GetClassInfoA
gdi32
DeleteDC
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
DeleteObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateBitmap
ExtTextOutA
GetObjectA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegOpenKeyA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyExA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegSetValueExA
RegQueryValueExA
shell32
Shell_NotifyIconA
comctl32
ord17
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
Sections
.text Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ