C:\inetpub\Temp\7ogb7ejujpo4uu6i3r456v9mm0\Stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4d35a47d51179c4152616669fbe643f8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d35a47d51179c4152616669fbe643f8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d35a47d51179c4152616669fbe643f8_JaffaCakes118
-
Size
128KB
-
MD5
4d35a47d51179c4152616669fbe643f8
-
SHA1
eed5dd4c40c6b7b8c46107af2b108a669db57872
-
SHA256
1946f0ee3981db2f92a663c9a15eff4023b117d774c990d6022bddf6d5e0758a
-
SHA512
e0ef84dadb26ed39ee772a7f4125c768b2465d5ff02e216d175baa67ae61009d7c7f4eb1bcc9649221150384359d5e7255d2c321f4b1ac650d5a44372ed5977e
-
SSDEEP
3072:5zrl/nonoroxGDi73tCg3qilL42wA52jOMkrcf:5zrl/nonoroxGDFg3qilL42IjOPrc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d35a47d51179c4152616669fbe643f8_JaffaCakes118
Files
-
4d35a47d51179c4152616669fbe643f8_JaffaCakes118.exe windows:4 windows x86 arch:x86
84c57526ff79bf269fc1fde55c48bec7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DialogBoxParamA
kernel32
IsValidCodePage
FreeResource
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
GetTickCount
GetThreadContext
GetCurrentThread
LoadLibraryA
GetModuleHandleA
GetProcAddress
IsBadReadPtr
VirtualProtect
VirtualFree
VirtualAlloc
CloseHandle
ReadFile
GetFileSize
CreateFileA
WaitForSingleObject
CreateThread
CreateProcessA
GetStartupInfoA
GetCommandLineA
WriteProcessMemory
VirtualAllocEx
SetThreadContext
ResumeThread
GetVersionExA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
RaiseException
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
Sleep
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
HeapSize
InitializeCriticalSection
RtlUnwind
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ