hh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
77f13a0f8543243db1c1ab5b03cfaa04_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
77f13a0f8543243db1c1ab5b03cfaa04_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
77f13a0f8543243db1c1ab5b03cfaa04_JaffaCakes118
-
Size
30KB
-
MD5
77f13a0f8543243db1c1ab5b03cfaa04
-
SHA1
9aee313d2e9b4c3e86085ea17ee018ff118c2f6f
-
SHA256
7ae33eaf40d447bd9707a390cd62247b887fa29047c4c76d375bd44f236abd89
-
SHA512
878e104e66d8b0e4e93fd5cb10c8fd18e808258b0a0d1309fca6ae5a88d9ffdcf59d83e5a6825ce4bc0a68595440a071c8d9fef394f324afa02068cef9d1e30e
-
SSDEEP
768:eqpm2p0NXSY/DBqG0jAphh3pPzkTiTZGVxEXi6RZo:3BpCCY/Dh00h57kGTZQ0Hw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 77f13a0f8543243db1c1ab5b03cfaa04_JaffaCakes118
Files
-
77f13a0f8543243db1c1ab5b03cfaa04_JaffaCakes118.exe windows:5 windows x86 arch:x86
9ed54609127a70e312733e0fe986dabe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetStartupInfoA
GetTickCount
QueryPerformanceCounter
LoadLibraryA
GetProcAddress
FreeLibrary
lstrcpyA
GetCurrentThreadId
user32
wsprintfA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 844B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE