d:\Source Code\_C++\_Encrypt\Crypter\release\Stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
649090e57974205ccea8997f6284644b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
649090e57974205ccea8997f6284644b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
649090e57974205ccea8997f6284644b_JaffaCakes118
-
Size
184KB
-
MD5
649090e57974205ccea8997f6284644b
-
SHA1
b9b54d1402791b96dddc4177875026152eae1090
-
SHA256
7b356f85bd42350d40313657dc959245c3964fcdf2dc78bf5f010749fb6ad154
-
SHA512
352e3dcceb0e5f6120c84058f3b9653b85f5df0f48893b4da7757edda7b7c765aacfbd1e2993042431eeeb0464f05564666fdf2c3a19228df6ce37e08be74e12
-
SSDEEP
3072:0Lr5mtn6vGCZrY0dbkqnBa6XFOIGh+IhxXdOJFpuNRWQ4ChpDV+7YvFUn00y:0LNPrY01JnBB1DGhpOFpEKCzBbUDy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 649090e57974205ccea8997f6284644b_JaffaCakes118
Files
-
649090e57974205ccea8997f6284644b_JaffaCakes118.exe windows:4 windows x86 arch:x86
1b613914fef763447b3ef9b93b0dd07f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
MessageBoxA
advapi32
GetUserNameA
kernel32
TlsAlloc
GetThreadContext
FindResourceA
SetThreadContext
LoadResource
SizeofResource
CreateProcessA
VirtualProtectEx
OpenMutexA
LockResource
GetModuleFileNameA
CreateMutexA
WriteProcessMemory
ResumeThread
GetLastError
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
Sleep
RtlUnwind
LoadLibraryA
GetCPInfo
GetACP
GetOEMCP
HeapSize
MultiByteToWideChar
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ