e:\builds\slave\comm-cen-trunk-w32-ntly\build\objdir\suite\app\seamonkey.pdb
Static task
static1
Behavioral task
behavioral1
Sample
70e0b19dccadcfc658a8f91e2a08fdb1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
70e0b19dccadcfc658a8f91e2a08fdb1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
70e0b19dccadcfc658a8f91e2a08fdb1_JaffaCakes118
-
Size
80KB
-
MD5
70e0b19dccadcfc658a8f91e2a08fdb1
-
SHA1
6c1004f88ae530ccc204d3a377ee95976d8872d6
-
SHA256
7412d3675be3e002dfee0bddba04d88c3321dbd05612b37861f07a6d4ede9fd3
-
SHA512
1a9e8e6ab64a93f7d803a72c2172d6e97eba059339bb44217b0ca368034acfc0f927d64849575034f45b6790bf3aaecefd769469d11d4e30c78f16dc6b0e6044
-
SSDEEP
1536:WH+VwSrWSv/CMYolQ1kjJzWm5lY4gcy3IEQ6:OsRv6MbEQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70e0b19dccadcfc658a8f91e2a08fdb1_JaffaCakes118
Files
-
70e0b19dccadcfc658a8f91e2a08fdb1_JaffaCakes118.exe windows:4 windows x86 arch:x86
f25ce88742927ff5d72c2178ab01ba33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetEnvironmentVariableW
ExpandEnvironmentStringsW
GetEnvironmentVariableW
GetModuleFileNameW
WideCharToMultiByte
GetProcessIoCounters
GetCurrentProcess
SetDllDirectoryW
MultiByteToWideChar
CloseHandle
ReadFile
CreateFileW
LoadLibraryExW
FreeLibrary
GetProcAddress
GetLastError
IsDebuggerPresent
UnhandledExceptionFilter
QueryPerformanceCounter
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
GetCurrentThreadId
GetTickCount
GetCurrentProcessId
TerminateProcess
GetSystemTimeAsFileTime
user32
MessageBoxW
msvcr80
strcpy
strlen
??3@YAXPAX@Z
_wfopen
fclose
fgets
sprintf
memset
getenv
_snwprintf
_wfullpath
wcscpy
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
__winitenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
_snprintf
_vsnwprintf
_stricmp
wcslen
??_V@YAXPAX@Z
strrchr
??2@YAPAXI@Z
_putenv
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ