J:\Backup\Visual Studio Projects\Injector\Release\Injector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
869991d58cf5d1f7832b35d9b9a270db_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
869991d58cf5d1f7832b35d9b9a270db_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
869991d58cf5d1f7832b35d9b9a270db_JaffaCakes118
-
Size
384KB
-
MD5
869991d58cf5d1f7832b35d9b9a270db
-
SHA1
66d8080a1e336c21d7603700e246eb0708da5224
-
SHA256
758d67af3ad23ffbc7638e96a38a9f7c385ab952f0c27dfc089085d432e32617
-
SHA512
789b656c94fd3a69ca005c1d48c3233c681072317b84a17112161c94d0b853634610cf7f0a3704fab43f035229a3001a7ffa8c0092bee93cd9185067d4a6ade2
-
SSDEEP
3072:jPF/bUxfkGyLnU5GgJ1Bxpp5oHjIUK9W8oiqHEX/kTTdgLRJAgiDAUlg1AjsdAhT:Dxwx8GCn+Xxpilg1rxpilg1c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 869991d58cf5d1f7832b35d9b9a270db_JaffaCakes118
Files
-
869991d58cf5d1f7832b35d9b9a270db_JaffaCakes118.exe windows:4 windows x86 arch:x86
b8c55ade4d80ed6deb71a74ea63f161c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OutputDebugStringA
GetProcAddress
GetModuleHandleA
GetSystemTimeAsFileTime
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
GetLastError
CloseHandle
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
GetTimeZoneInformation
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
FatalAppExitA
HeapAlloc
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetStdHandle
FlushFileBuffers
RtlUnwind
InterlockedExchange
VirtualQuery
CreateFileA
InitializeCriticalSection
SetFilePointer
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
SetEndOfFile
ReadFile
LCMapStringA
MultiByteToWideChar
LCMapStringW
SetConsoleCtrlHandler
HeapSize
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
CompareStringA
CompareStringW
SetEnvironmentVariableA
VirtualProtect
GetSystemInfo
GetLocaleInfoW
GetVersion
CreateRemoteThread
FindFirstFileA
GetPrivateProfileStringA
Process32Next
Process32First
CreateToolhelp32Snapshot
Thread32Next
Thread32First
OpenProcess
Sleep
CreateThread
CreateMutexA
GlobalFree
ReadProcessMemory
GlobalAlloc
SetThreadContext
SuspendThread
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetThreadContext
GetExitCodeThread
WaitForSingleObject
mscoree
_CorExeMain
user32
MessageBoxA
shell32
ShellExecuteA
psapi
GetModuleBaseNameA
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 168KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ