C:\Documents and Settings\mohna300\My Documents\Downloads\Compressed\USBDumper\USBDumper\src\Debug\USB.pdb
Static task
static1
Behavioral task
behavioral1
Sample
85ec6a76d0e0d417642cd411cbd646fb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
85ec6a76d0e0d417642cd411cbd646fb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
85ec6a76d0e0d417642cd411cbd646fb_JaffaCakes118
-
Size
436KB
-
MD5
85ec6a76d0e0d417642cd411cbd646fb
-
SHA1
fe7ea3a1552acb0c807d2fa8c8cca0ef67a65427
-
SHA256
9166b026c2792f2a75877757a9173ae3587796233377a934c518b2a5d57d7943
-
SHA512
1a94130b599f6b694533f3977d4566fea9c72cfef7291787016afbaf979788bbe32abeab2f62aaa1335c88f9f24159facf31f13a2888899228d995ccf2b263a3
-
SSDEEP
6144:QLgnrI97iBoMSl8tRMcJEJuHOAIkw1hhQac2uFPadcqMGyVdfKR1Cu:QLUkx1MSl8scJuuHO1RSRgdcqMGyVdf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85ec6a76d0e0d417642cd411cbd646fb_JaffaCakes118
Files
-
85ec6a76d0e0d417642cd411cbd646fb_JaffaCakes118.exe windows:5 windows x86 arch:x86
bac720bd2b8405796e272ae4fe1bc36b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CopyFileA
GetLocalTime
FindClose
FindNextFileA
FindFirstFileA
CompareStringW
CompareStringA
CreateFileA
GetTimeZoneInformation
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
CloseHandle
GetLocaleInfoW
SetFilePointer
GetLastError
GetFullPathNameA
GetDriveTypeA
CreateDirectoryA
GetCommandLineA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryA
DeleteCriticalSection
FatalAppExitA
HeapValidate
IsBadReadPtr
GetCurrentDirectoryA
SetCurrentDirectoryA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleW
Sleep
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryW
RtlUnwind
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
InitializeCriticalSectionAndSpinCount
HeapSize
HeapReAlloc
VirtualAlloc
InterlockedExchange
FlushFileBuffers
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
SetEnvironmentVariableA
user32
wsprintfA
DefWindowProcA
RegisterClassExA
CreateWindowExA
ShowWindow
RegisterDeviceNotificationA
GetMessageA
TranslateMessage
DispatchMessageA
Sections
.textbss Size: - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 353KB - Virtual size: 353KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ