t:\word\x86\ship\0\winword.pdb
Static task
static1
Behavioral task
behavioral1
Sample
88220a76c3996bd18dc25daff0379647_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
88220a76c3996bd18dc25daff0379647_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
88220a76c3996bd18dc25daff0379647_JaffaCakes118
-
Size
415KB
-
MD5
88220a76c3996bd18dc25daff0379647
-
SHA1
bfb7e6c5f52f0a90666a020db66b5d43260a6b52
-
SHA256
8d7310da341aded82c834d0e94867792ac7fc4811de3fdb9fa9dbae9d7416072
-
SHA512
6699b0e419fb0f07b262afdf6810a365520facab4aa7a97ad8366f281cff7168abf04c5c436adcb0aa9290e06d735c31ce06da73805f5294eb0d19c34bd885a5
-
SSDEEP
12288:8nIO39YAeNLFjAYarEdrEb5P6VxY6tYNevQeF:8IsJeNhaodobEHtM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88220a76c3996bd18dc25daff0379647_JaffaCakes118
Files
-
88220a76c3996bd18dc25daff0379647_JaffaCakes118.exe windows:4 windows x86 arch:x86
46337557842a2a62735bb11eb096b204
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeLibrary
GetProcAddress
LoadLibraryW
LoadLibraryExW
GetSystemDirectoryW
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetModuleHandleW
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
VirtualProtect
IsDebuggerPresent
msvcr80
_crt_debugger_hook
__set_app_type
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_unlock
Exports
Exports
DllGetLCID
wdCommandDispatch
wdGetApplicationObject
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 900B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 325KB - Virtual size: 325KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.ddata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE