H:\OlTRRYXYkaO921jYkGv2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
67eda9d2784d234ada71539c15e6c2ff_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
67eda9d2784d234ada71539c15e6c2ff_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67eda9d2784d234ada71539c15e6c2ff_JaffaCakes118
-
Size
257KB
-
MD5
67eda9d2784d234ada71539c15e6c2ff
-
SHA1
1fcc0ca70bc24d324897846a6780448939ffae6b
-
SHA256
b986e7fb3a9177dc61fe56c6678b488ad0977a8eba97e5518e977fc9040eea68
-
SHA512
318be2330acc482a219ed8e0063251831d64a1c8a6d4ec559c9616242ee5c861bec8818d337f3c9db9f4d8165faa98ade332699882259c81df54e4fff1128241
-
SSDEEP
6144:WpB9ZI5dnkurYQbU7gNDuQZpO1BjQdkT+5efY3WilQSQh:Wz9QdnkusQbUUNDzK1adA+YY3Wi+S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67eda9d2784d234ada71539c15e6c2ff_JaffaCakes118
Files
-
67eda9d2784d234ada71539c15e6c2ff_JaffaCakes118.exe windows:5 windows x86 arch:x86
2db1fb6c1818b19eacd6aad2e98c7353
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
GetTickCount
EnumSystemLocalesA
GetLocaleInfoA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
RaiseException
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
LoadLibraryW
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
FreeLibrary
HeapAlloc
GetProcessHeap
VirtualQuery
FatalAppExitA
SetConsoleCtrlHandler
InterlockedExchange
GetLocaleInfoW
RtlUnwind
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
HeapReAlloc
HeapSize
CreateFileW
CloseHandle
FlushFileBuffers
GetUserDefaultLCID
IsValidLocale
user32
wsprintfA
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ