e:\project\Poison\Release\Poison.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5e5c180a484e33132fb7d3cbebe547cf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e5c180a484e33132fb7d3cbebe547cf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e5c180a484e33132fb7d3cbebe547cf_JaffaCakes118
-
Size
112KB
-
MD5
5e5c180a484e33132fb7d3cbebe547cf
-
SHA1
e4c89aa19a7e03062774aee85ae698d2e245035c
-
SHA256
1b2e5857eca32cd0a4bd3b30bbcf3d3945cad6cae460b3fe8a8b320d3ecd8751
-
SHA512
bb84561f39b2bb6683b647adb92a1aa8cc066d2b266b2f765318b1d87de3e109ba719082d44d100b05457fc4d3a247decec4d9bd38fdb2a2eb6f1658c980016f
-
SSDEEP
3072:Ec9InFlyWcp/R+DLF/NdBH41uUCIbkUf:Ec9Igpod/NA1uUC9U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e5c180a484e33132fb7d3cbebe547cf_JaffaCakes118
Files
-
5e5c180a484e33132fb7d3cbebe547cf_JaffaCakes118.exe windows:4 windows x86 arch:x86
0173343235363ff05c57fe5ab9a6fb3c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc71
ord5182
ord4212
ord4735
ord4890
ord1671
ord1670
ord1551
ord5912
ord1620
ord1617
ord3946
ord1401
ord4244
ord5152
ord1908
ord5073
ord6275
ord4185
ord5203
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord1063
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2862
ord4486
ord4262
ord3182
ord354
ord6065
ord4118
ord4580
ord4749
ord709
ord501
ord1084
ord3641
ord3830
ord5975
ord2020
ord764
ord605
ord757
ord566
ord3333
ord4261
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord3683
ord2396
ord4541
ord1207
msvcr71
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
__security_error_handler
__CxxFrameHandler
_setmbcp
_controlfp
free
_except_handler3
memset
__dllonexit
_onexit
kernel32
CreateMutexA
ExitProcess
DeleteFileA
GetLastError
GetWindowsDirectoryA
lstrcpyA
lstrcatA
GetModuleHandleA
FindResourceA
LoadResource
SizeofResource
LockResource
CreateFileA
WriteFile
FreeResource
CloseHandle
MoveFileA
InitializeCriticalSection
DeleteCriticalSection
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetVersionExA
user32
GetSystemMetrics
EnableWindow
GetClientRect
IsIconic
SendMessageA
DrawIcon
LoadIconA
advapi32
StartServiceA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
OpenServiceA
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ