cliconfg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5e3d1abf87c13b8b526070c9c858d876_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5e3d1abf87c13b8b526070c9c858d876_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e3d1abf87c13b8b526070c9c858d876_JaffaCakes118
-
Size
13KB
-
MD5
5e3d1abf87c13b8b526070c9c858d876
-
SHA1
14794db809b07f33420df1945168de4b9cfc4b60
-
SHA256
cb197a3eaabe5b68e6686c6e8fc87a417a30706f755a6c7791e51cb12d6fa664
-
SHA512
a10ae064727119a1801c121696071a1460ee16bd3476900ed6e76c33cc49aafed86e326bcb5917146c6e6a62de767d2df4dcafea041ac5002641c3d151636a68
-
SSDEEP
384:4jgi2jGB7wxYos79KETCvWo8hQWeRfmBT:6gXq6o9xTdhTT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e3d1abf87c13b8b526070c9c858d876_JaffaCakes118
Files
-
5e3d1abf87c13b8b526070c9c858d876_JaffaCakes118.exe windows:5 windows x86 arch:x86
818f1fbcebdb7a5abf3dc7abeb6af66a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
FormatMessageA
GetLastError
SetLastError
VirtualAlloc
CloseHandle
MapViewOfFile
CreateFileMappingA
VirtualFree
GetProcAddress
VirtualProtect
LoadLibraryA
GetModuleHandleA
GetModuleFileNameW
UnmapViewOfFile
lstrlenW
lstrcpyW
HeapFree
lstrcpynW
GetFullPathNameW
SetEnvironmentVariableW
HeapAlloc
GetProcessHeap
GetFileSize
ReadFile
SetFilePointer
CreateFileW
WideCharToMultiByte
GetEnvironmentVariableW
GetVersion
lstrcmpiW
FreeLibrary
LoadLibraryW
user32
wsprintfW
MessageBoxA
Sections
.text Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.res Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 68B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE