od.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7066da76e54b18729824adcfc4d9448a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7066da76e54b18729824adcfc4d9448a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7066da76e54b18729824adcfc4d9448a_JaffaCakes118
-
Size
43KB
-
MD5
7066da76e54b18729824adcfc4d9448a
-
SHA1
45265bea36ac5ebe269fa056b7259e4532879615
-
SHA256
3fe0bef9293b3cbed8879caf755ea6a657867a697faa247ec7251574237c4cd5
-
SHA512
ae972ca214ed0a729a34e5f743a3078d262d5e3a4d688fa6e9c84802011cda60ff2b08481c29126d2540709274facdb247e1d7da7cfee073339f66f05b910d77
-
SSDEEP
768:pwM3a6lIYLe5rWjt8XSKfbkiEvLy+XM4YOD0CMFt2WkYczBQ+O2S:pwwlIYLecjt8XTfb6o4SCMhS1O2S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7066da76e54b18729824adcfc4d9448a_JaffaCakes118
Files
-
7066da76e54b18729824adcfc4d9448a_JaffaCakes118.exe windows:4 windows x86 arch:x86
dbb268a858c1392d055274ded7894cf5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadFile
SetFilePointer
CloseHandle
CreateFileA
GetModuleFileNameA
GetModuleHandleA
InterlockedDecrement
GetProcessHeap
HeapFree
EnumCalendarInfoExA
HeapValidate
IsValidLanguageGroup
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CompareStringA
WaitForMultipleObjects
HeapAlloc
ExitProcess
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegDeleteValueW
RegEnumValueA
RegOpenKeyExW
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ