D:\C++\Reg_Entry\reg_en\Release\reg_en.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4d3efe640b8be97d7243dd218b66fdb4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d3efe640b8be97d7243dd218b66fdb4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d3efe640b8be97d7243dd218b66fdb4_JaffaCakes118
-
Size
57KB
-
MD5
4d3efe640b8be97d7243dd218b66fdb4
-
SHA1
f7dc8b2bec2d4b7759fb77bbd7765695eafa9302
-
SHA256
160f304cfd6e9f675aa6a98ef860b73b1d2aeb11f784676787dd6cdd4d5c7dc5
-
SHA512
89c01cdcf4e49017f3fd7d3e7e6e7aae462b783ecf3da2e69a14ef840dc5b1c598015cfb7349825f9acc60ebdf87e04f03eb54b98b04addb50d4854b6a7c2e3a
-
SSDEEP
384:NZQyVDQzoYxRLhW1xq3UZU9w1xq3UZU92p:rfYxRLWZU9qZU9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d3efe640b8be97d7243dd218b66fdb4_JaffaCakes118
Files
-
4d3efe640b8be97d7243dd218b66fdb4_JaffaCakes118.exe windows:5 windows x86 arch:x86
77ee0cd8044f3d32d077019b8f53b8af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
DialogBoxParamA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
msvcr90
_except_handler4_common
_invoke_watson
_controlfp_s
_decode_pointer
_onexit
exit
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
kernel32
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetTickCount
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCurrentProcess
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ