Y:\Mars\Release\USBExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
66da973e571b3634e17c5267cb9bd896_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66da973e571b3634e17c5267cb9bd896_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66da973e571b3634e17c5267cb9bd896_JaffaCakes118
-
Size
1.0MB
-
MD5
66da973e571b3634e17c5267cb9bd896
-
SHA1
981acae09cf62f09a2fc4c08fdc887690053c7c4
-
SHA256
4312e3d0f176a003657318bab1daaf2067fdf7dbef57269216b72f66d0d52f9a
-
SHA512
a940c1db52a4bd153b1371e099dba11168da03d86d132f7c411c329401e5c28bdb733aa573bfda4e8d3ac6aafcd35cbffeb86457f35d49cd895f1d2ae468d90a
-
SSDEEP
24576:X8annnE4LAmCPUXUDTKmCKlpgYMSi3/dfZFbe6qbCIFJvFC:X8annnE+A7PUnKlOr3Ffb3nIF9FC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66da973e571b3634e17c5267cb9bd896_JaffaCakes118
Files
-
66da973e571b3634e17c5267cb9bd896_JaffaCakes118.exe windows:5 windows x86 arch:x86
db9bdf8c7d60a25ee8cbbbbd0ecdd54c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
GetCurrentProcess
GetStdHandle
SetErrorMode
Sleep
GetTempPathA
lstrcmpiA
lstrcpyA
GetSystemTime
SetFileAttributesA
lstrcatA
CopyFileA
TerminateThread
ResumeThread
GetCurrentThreadId
CreateThread
GetModuleFileNameA
OpenMutexA
OpenProcess
GetModuleHandleA
CreateRemoteThread
CreateToolhelp32Snapshot
Thread32First
OpenThread
WaitForSingleObjectEx
Thread32Next
Process32First
Process32Next
GetTickCount
DeleteFileA
VirtualAlloc
VirtualFree
FindResourceA
SizeofResource
LoadResource
WriteFile
FreeLibrary
lstrlenA
GetVersionExA
GetFileAttributesA
GetModuleFileNameW
lstrcpynW
lstrcatW
CreateDirectoryW
SetFileAttributesW
MoveFileExW
DeleteFileW
GetShortPathNameW
GetEnvironmentVariableW
lstrcpyW
SetPriorityClass
SetThreadPriority
GetCurrentThread
GetDriveTypeA
GetLastError
SetFilePointer
CreateFileW
WriteConsoleW
LoadLibraryW
HeapReAlloc
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
SetEndOfFile
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
CreateDirectoryA
CreateProcessA
UnmapViewOfFile
IsBadReadPtr
MapViewOfFile
CloseHandle
CreateFileMappingA
CreateFileA
HeapFree
VirtualAllocEx
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
LockResource
ReadProcessMemory
FreeEnvironmentStringsW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FlushFileBuffers
ReadFile
GetConsoleMode
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
ExitProcess
HeapCreate
IsProcessorFeaturePresent
SetHandleCount
GetConsoleCP
user32
SendMessageA
MessageBoxA
ShowWindow
PostThreadMessageA
DefWindowProcA
PostQuitMessage
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
GetMessageA
advapi32
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptReleaseContext
CryptAcquireContextA
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
CryptDestroyHash
shell32
ShellExecuteA
SHCreateDirectoryExA
ShellExecuteExW
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 976KB - Virtual size: 975KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ