net.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7295553848d3741b6ce4b9862803d51d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7295553848d3741b6ce4b9862803d51d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7295553848d3741b6ce4b9862803d51d_JaffaCakes118
-
Size
68KB
-
MD5
7295553848d3741b6ce4b9862803d51d
-
SHA1
4c4109bea712884367acdd03031929f4a505e0ed
-
SHA256
43cc92ac69cc99d01a70a1af6788b46cb2f24f8677057627c9effee56acb857c
-
SHA512
15265e1bd8db3ec0ea7f293f89da6ad63f9923d123016c2d049bb9fa8be168f385f331562a33c842f08a7f2c6606f70d858a573f349ddbac7cb8af45c87f79fb
-
SSDEEP
1536:CWCblrmti5XZkqXSYjRPumE6keqOlwnUcxQ8HdeXru:NKHXbSYjRmmGeqOlfeX9p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7295553848d3741b6ce4b9862803d51d_JaffaCakes118
Files
-
7295553848d3741b6ce4b9862803d51d_JaffaCakes118.exe windows:5 windows x86 arch:x86
80c9d923cc8b4ddc6c2a925eb59ed60f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_setmode
qsort
wcsncmp
wcsncpy
wcsrchr
_c_exit
_exit
_XcptFilter
_cexit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_ultow
wcspbrk
iswctype
_wcsupr
wcscmp
_wcsicmp
wcschr
wcscpy
wcscat
exit
sprintf
setlocale
_wcsnicmp
wcslen
_iob
_vsnwprintf
_snwprintf
putchar
malloc
swprintf
wcsspn
wcscspn
calloc
fread
ftell
_wcsdup
wcstok
_wfopen
_local_unwind2
memmove
_ultoa
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegEnumValueW
kernel32
LoadLibraryW
FormatMessageW
LocalFree
GetModuleFileNameW
SetLastError
PeekConsoleInputW
GetConsoleMode
SetConsoleMode
ReadConsoleW
GetFileType
DelayLoadFailureHook
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetConsoleScreenBufferInfo
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
LoadLibraryA
InterlockedCompareExchange
FreeLibrary
WriteConsoleW
GetDriveTypeW
WriteProfileStringW
GetProfileStringW
CreateProcessW
CloseHandle
WaitForSingleObject
WriteFile
WideCharToMultiByte
LocalAlloc
GetCurrentProcess
GetProcAddress
GetCommandLineW
GetLastError
GetStdHandle
SetThreadLocale
GetSystemDefaultLangID
GetCPInfo
GetConsoleOutputCP
GetExitCodeProcess
netapi32
NetServerGetInfo
NetServerEnum
NetWkstaGetInfo
NetWkstaUserGetInfo
I_NetPathType
I_NetNameValidate
NetApiBufferReallocate
NetApiBufferAllocate
NetapipBufferAllocate
NetShareEnum
NetApiBufferFree
NetUseEnum
NetUseGetInfo
NetUserGetInfo
mpr
WNetGetLastErrorW
WNetAddConnection2W
WNetCancelConnection2W
WNetCloseEnum
WNetGetConnectionW
WNetOpenEnumW
WNetEnumResourceW
ntdll
RtlAllocateHeap
RtlInitUnicodeString
RtlOemStringToUnicodeString
RtlInitAnsiString
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
poobmib Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE