c:\Dokumente und Einstellungen\Brock1\Desktop\Viral v5 Source Code\Debug\Viral v1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
662697d33836e8549d6453944b6a5386_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
662697d33836e8549d6453944b6a5386_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
662697d33836e8549d6453944b6a5386_JaffaCakes118
-
Size
832KB
-
MD5
662697d33836e8549d6453944b6a5386
-
SHA1
97527bada435f99a1d88773141930c0516d5d91f
-
SHA256
1573bf2b765dd70a20afbe65bcb9f013a3b3811d3bc391d70c56cae54e634a7a
-
SHA512
ad02a9d9439a501e6a1fa3f8e9580f5b461a9ebfde0e47ad60ed204449c5d8554f8b61c9141c9650307795b81e33125a409ad8e2bf2668575b11b6d0a1ae3112
-
SSDEEP
12288:2/tfGu83NARo4J2U05qudVNJUh0mE6hs4tyUTYr3qINvUh:EfGjNARo4J0mU4UyXh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 662697d33836e8549d6453944b6a5386_JaffaCakes118
Files
-
662697d33836e8549d6453944b6a5386_JaffaCakes118.exe windows:4 windows x86 arch:x86
f321b0a248df7c78a19a17768e4bd717
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CompareStringW
CompareStringA
GetTimeZoneInformation
SetEndOfFile
GetLocaleInfoW
GetDateFormatA
GetTimeFormatA
InterlockedExchange
GetOEMCP
GetACP
SetStdHandle
ReadFile
CreateFileA
FreeLibrary
GetCurrentProcess
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
VirtualQuery
GetSystemInfo
VirtualProtect
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetStringTypeW
GetStringTypeA
SetPriorityClass
CreateThread
SetThreadPriority
GetModuleHandleA
GetProcessHeap
Sleep
IsBadCodePtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
WideCharToMultiByte
RtlUnwind
RaiseException
IsBadWritePtr
IsBadReadPtr
HeapValidate
TerminateProcess
ExitProcess
GetProcAddress
GetStartupInfoA
GetCommandLineA
GetVersionExA
MultiByteToWideChar
LCMapStringA
GetLastError
LCMapStringW
GetCPInfo
DebugBreak
LoadLibraryA
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
SetFilePointer
FlushFileBuffers
CloseHandle
SetUnhandledExceptionFilter
HeapAlloc
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetEnvironmentVariableA
user32
SendMessageA
GetAsyncKeyState
GetDC
GetSystemMetrics
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
CreatePopupMenu
AppendMenuA
SetMenuDefaultItem
SetForegroundWindow
TrackPopupMenu
DestroyMenu
MessageBoxA
DestroyWindow
PostQuitMessage
DefWindowProcA
SetDlgItemInt
GetDlgItemInt
EndDialog
DialogBoxParamA
SetCursorPos
mouse_event
FindWindowA
GetCursorPos
gdi32
SetTextColor
SetBkMode
GetPixel
SetPixel
CreateSolidBrush
shell32
Shell_NotifyIconA
ShellExecuteA
urlmon
URLDownloadToFileA
winmm
PlaySoundA
mciSendCommandA
Sections
.textbss Size: - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 276KB - Virtual size: 274KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 504KB - Virtual size: 501KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ