d:\projects\fdrv2\release\downloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4df9d5eb67d2867b58c9f78d539f09c0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4df9d5eb67d2867b58c9f78d539f09c0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4df9d5eb67d2867b58c9f78d539f09c0_JaffaCakes118
-
Size
165KB
-
MD5
4df9d5eb67d2867b58c9f78d539f09c0
-
SHA1
4b44f63460d8ea3a74337109d5534234ae541f61
-
SHA256
a9cdbaa555b0de5d3d6ded19960cea5e8188a3b9bbf948a9ccb28ff12151ac50
-
SHA512
58ab3b543c0eaefaaee9a9d1767f80471fd116ad27fc28764bad7a60ac6f0e3870696ad4a1ba203a5c2ce38ec5899da07e8b30361aa9703b8eeb1394df4407e9
-
SSDEEP
3072:pg7fJVaISj52aq34UzWf5nmyUWhzN/M0ugHpb6v:e7fJVaz5hEWlmxWhm1gJuv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4df9d5eb67d2867b58c9f78d539f09c0_JaffaCakes118
Files
-
4df9d5eb67d2867b58c9f78d539f09c0_JaffaCakes118.exe windows:5 windows x86 arch:x86
451178a529afa0028ca0da670b036550
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wsock32
connect
WSAStartup
htons
shutdown
socket
closesocket
send
shlwapi
StrStrW
StrRChrW
kernel32
lstrlenA
FormatMessageW
GetLastError
LocalAlloc
LocalFree
lstrcpyW
GetFileSize
SetFilePointer
WriteFile
ReadFile
CreateFileW
GetCurrentDirectoryW
GetFileTime
CloseHandle
SetFileAttributesW
SetErrorMode
GetNativeSystemInfo
GetVersionExW
lstrlenW
SetCurrentDirectoryW
GetShortPathNameW
WinExec
lstrcpynW
lstrcmpW
ExitProcess
GetSystemDirectoryW
WideCharToMultiByte
GetModuleFileNameW
MultiByteToWideChar
GetTempPathW
GetLocalTime
GetSystemInfo
GetWindowsDirectoryW
GetVolumeInformationW
GetModuleHandleA
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
GetModuleHandleW
UnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
HeapSize
HeapAlloc
RaiseException
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
VirtualAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
wsprintfW
GetSystemMetrics
IsCharAlphaW
advapi32
RegCloseKey
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
StartServiceW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
CreateServiceW
RegSetValueExW
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ