U:\dev\rel\src\dedicated_main\Release\dedicated_main.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6f3df197735954a29153727dc810d4fb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f3df197735954a29153727dc810d4fb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f3df197735954a29153727dc810d4fb_JaffaCakes118
-
Size
132KB
-
MD5
6f3df197735954a29153727dc810d4fb
-
SHA1
136b8fe815ae135894a5c29d97443213f7269cc1
-
SHA256
910c9e5730e0961d59a38ee7aac2cf3a5a7d2cdf4618f5b46e3644fb902c1195
-
SHA512
f15e5f319e51904c72b1ca34398d556d73e2158615eaa351aa5bc10475f2dad53ab7a756250e108d6b305cfa3bd2f4e75c307548e08d9dfb0e7b57706d3eb5a8
-
SSDEEP
1536:qwtmaeQpr2yNmYSe173WWKKp5FmUQyEj2SkdalhsEYlUhUw/b18:qhQ12yNSkroUQ+SWal1YlaT/bu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f3df197735954a29153727dc810d4fb_JaffaCakes118
Files
-
6f3df197735954a29153727dc810d4fb_JaffaCakes118.exe windows:4 windows x86 arch:x86
7d2bad4a7aa5a3924d54e9665cc5466b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
kernel32
GetProcAddress
LocalFree
FormatMessageA
GetLastError
LoadLibraryA
GetModuleFileNameA
GetCurrentDirectoryA
GetModuleHandleA
ReadFile
SetEndOfFile
HeapSize
IsValidCodePage
MultiByteToWideChar
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetStartupInfoA
GetCommandLineA
GetVersionExA
WideCharToMultiByte
SetEnvironmentVariableW
ExitProcess
TerminateProcess
GetCurrentProcess
HeapFree
HeapAlloc
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetFullPathNameA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
CloseHandle
TlsAlloc
SetLastError
GetCurrentThreadId
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
RtlUnwind
InterlockedExchange
SetFilePointer
CompareStringA
GetCPInfo
CompareStringW
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetFileAttributesA
SetStdHandle
FlushFileBuffers
CreateFileA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
user32
PostMessageA
MessageBoxA
FindWindowA
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ