d:\dev\vc\me\Nc\Act\Release\Act.pdb
Static task
static1
Behavioral task
behavioral1
Sample
855113d3a97afcd9a2684143d61d1951_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
855113d3a97afcd9a2684143d61d1951_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
855113d3a97afcd9a2684143d61d1951_JaffaCakes118
-
Size
116KB
-
MD5
855113d3a97afcd9a2684143d61d1951
-
SHA1
01d3f17ec1265a42c89bd4882bc370618366f91e
-
SHA256
c96a7c7a9b89a2c4033926afd944c3b103dc022317986c8da4b3984c27119510
-
SHA512
4f0f1845d440a7cd13fbbea0ee212d044e234e08c792ed06cbf86c3c2436fa5d60e1f909748ae12478e1fb9ea95f4881ec8a200ab1b76fa029e05753c0216ffc
-
SSDEEP
3072:cT9ZzY3puJyRvEOkEgMcS1ur0uuI8PK6I3S2lO:QTs3TdYGHIiZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 855113d3a97afcd9a2684143d61d1951_JaffaCakes118
Files
-
855113d3a97afcd9a2684143d61d1951_JaffaCakes118.exe windows:4 windows x86 arch:x86
77f46e6609f03333a6f3418a14e69528
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstFileA
FindNextFileA
FindClose
FreeLibrary
LocalFree
GetVersionExA
MapViewOfFile
UnmapViewOfFile
ExitProcess
CreateFileA
SystemTimeToFileTime
SetFileTime
GetStdHandle
SetHandleCount
SetFilePointer
WriteFile
ReadFile
OpenProcess
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsBadCodePtr
FlushFileBuffers
SetStdHandle
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetCPInfo
GetOEMCP
CopyFileA
GetModuleFileNameA
Sleep
DeleteFileA
GetProcAddress
GetLastError
LoadLibraryA
WideCharToMultiByte
InterlockedDecrement
CreateMutexA
CloseHandle
ReleaseMutex
FormatMessageA
GetTimeZoneInformation
GetACP
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
VirtualQuery
InterlockedExchange
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapSize
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
MultiByteToWideChar
lstrlenA
GetSystemTimeAsFileTime
IsBadReadPtr
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
GetFileType
user32
DispatchMessageA
RegisterClassExA
CreateWindowExA
MessageBoxA
ShowWindow
TranslateMessage
UpdateWindow
DestroyWindow
PostQuitMessage
PostMessageA
SetTimer
GetMessageA
SetWindowTextA
GetClassNameA
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
DefWindowProcA
FindWindowA
EndPaint
BeginPaint
TranslateAcceleratorA
advapi32
RegQueryInfoKeyA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
SetSecurityInfo
SetEntriesInAclA
GetSecurityInfo
shell32
ShellExecuteA
ole32
CoCreateInstance
CoCreateGuid
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
VariantClear
userenv
GetProfilesDirectoryA
urlmon
CreateURLMoniker
wininet
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetSetOptionA
InternetOpenUrlA
HttpQueryInfoA
netapi32
Netbios
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ