C:\Obnubilate\Temp\saot92do2ubo037rki8sf9st33\Stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
73e76f47114362d7d346db4795b58c84_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73e76f47114362d7d346db4795b58c84_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73e76f47114362d7d346db4795b58c84_JaffaCakes118
-
Size
159KB
-
MD5
73e76f47114362d7d346db4795b58c84
-
SHA1
8d3b191cc0cf5170d78df46461ff3498434dcf62
-
SHA256
ad4a012885b1ddf31ba07d7ec9d9217831dd15bfe70d30bd756f1f4e00b8dcfa
-
SHA512
6a0e8397c8cecd63fdc85874bec1659cc8409a6127abebb7bb7e835c7f0499e7fe5ab2e7d5aaa257cd4bfe6749d1e795cc8d55e018ecf69cda50d915b6c31e6c
-
SSDEEP
3072:bUmrJPY5pa4ELz5JDl0ft1w6NmQ2ci6vSNbys:gmt42L9JDl0V1NNmrcpvWms
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73e76f47114362d7d346db4795b58c84_JaffaCakes118
Files
-
73e76f47114362d7d346db4795b58c84_JaffaCakes118.exe windows:5 windows x86 arch:x86
8ffc063cc04c8a21865cef096d3590ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
GetModuleFileNameExA
kernel32
FreeEnvironmentStringsW
ExitProcess
FindResourceA
LoadResource
GetCurrentProcess
WaitForSingleObject
FindResourceExA
GetLastError
SetLastError
VirtualProtectEx
LockResource
WriteProcessMemory
CreateThread
IsBadReadPtr
GetProcAddress
VirtualAlloc
LoadLibraryA
VirtualProtect
HeapAlloc
GetCommandLineA
GetStartupInfoA
HeapFree
RaiseException
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
MultiByteToWideChar
ReadFile
SetHandleCount
GetFileType
SetFilePointer
CloseHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
InitializeCriticalSectionAndSpinCount
CreateFileA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ