x:\Dev_CPP\Work\VS_KnzStr_Adware\Release\VS_Work4.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5dc7898b04f7879793f8327c2f4d4d16_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5dc7898b04f7879793f8327c2f4d4d16_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5dc7898b04f7879793f8327c2f4d4d16_JaffaCakes118
-
Size
78KB
-
MD5
5dc7898b04f7879793f8327c2f4d4d16
-
SHA1
839f9297faca35b6536cc804443f8735ee295b0b
-
SHA256
0af4a55d87dbe044d346656710d761b3d26c30c51e59f5bd90094213d1774c09
-
SHA512
a8cbd6ad388e14625ab8f6f807b0990c9197c2bf0c5f99c71a5a8257f3635b2e8182b0949db70cddcb8fd6f61fc669830708c83e053cb7e7561da586da6bdbf5
-
SSDEEP
1536:5zegWmChJirxizWQjeeUbUencn0E1fQdWK5h7W6:5zegI/iU1sE1fQd75h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5dc7898b04f7879793f8327c2f4d4d16_JaffaCakes118
Files
-
5dc7898b04f7879793f8327c2f4d4d16_JaffaCakes118.exe windows:5 windows x86 arch:x86
bb59873cfc61dbd6af5b116861f5b285
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
lstrcpyA
lstrcatA
lstrcmpA
CreateMutexA
GetLastError
Sleep
CloseHandle
ExpandEnvironmentStringsA
CreateProcessA
TerminateProcess
GetFileAttributesA
GetModuleFileNameA
WinExec
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SetEndOfFile
SetFilePointer
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RaiseException
HeapFree
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
VirtualAlloc
HeapReAlloc
CreateFileA
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
MultiByteToWideChar
ReadFile
LCMapStringA
LCMapStringW
user32
DispatchMessageA
TranslateMessage
GetMessageA
AppendMenuA
CreatePopupMenu
CreateWindowExA
RegisterClassExA
LoadCursorA
DefWindowProcA
PostMessageA
TrackPopupMenuEx
SetForegroundWindow
GetCursorPos
PostQuitMessage
SetTimer
MessageBoxA
KillTimer
CharUpperA
LoadIconA
shell32
Shell_NotifyIconA
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ