y:\test4\e91\Debug\e91.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8c8ce65ebadc2452f4ab1206e05b28ce_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c8ce65ebadc2452f4ab1206e05b28ce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c8ce65ebadc2452f4ab1206e05b28ce_JaffaCakes118
-
Size
726KB
-
MD5
8c8ce65ebadc2452f4ab1206e05b28ce
-
SHA1
ea2344ec9cc8501c89b13e26d4feca0fa8e3631b
-
SHA256
2988c244f8e3e15c536cf65a568cab2278747daf191115bb9293e9209a57b8b8
-
SHA512
ba28c12ad50f8cd6a433c54d9210fe771ff1b70f903688723fdf403739d7102084a1c28abe43901e6f4a4d57f62e03a9ed6b755831d9816d7bb9397fe68aae43
-
SSDEEP
6144:tZyOBr1ve7EezFk5Osms+i7iJ3c3hBrRmgJnlDmpMmcG91FU/FE1rQmQgVfX0fhd:t4OzSsWsrrarJQgVfX0/zAFgkLC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c8ce65ebadc2452f4ab1206e05b28ce_JaffaCakes118
Files
-
8c8ce65ebadc2452f4ab1206e05b28ce_JaffaCakes118.exe windows:4 windows x86 arch:x86
96fe5cbff1567daff6773ad3ecfed880
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetThreadLocale
GetLocalTime
GetProcAddress
GetLocaleInfoA
DeleteCriticalSection
RaiseException
GetACP
InterlockedExchange
LoadLibraryExW
GetVersionExA
WaitForSingleObject
GetCurrentThreadId
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
CloseHandle
SetEvent
OpenEventA
lstrlenA
lstrcpyA
lstrcpyW
OutputDebugStringA
OutputDebugStringW
lstrcpynW
MultiByteToWideChar
VirtualAlloc
UnmapViewOfFile
IsBadReadPtr
GetSystemInfo
MapViewOfFile
GetLastError
CreateFileMappingA
GetCurrentThread
GetVersion
OpenFileMappingA
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
GetModuleFileNameA
RtlUnwind
IsBadWritePtr
HeapValidate
DebugBreak
GetStdHandle
WriteFile
LoadLibraryA
GetModuleHandleA
GetStartupInfoW
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
SetConsoleCtrlHandler
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualQuery
SetUnhandledExceptionFilter
GetProcessHeap
FreeLibrary
CreateFileW
IsBadCodePtr
GetStringTypeA
GetStringTypeW
SetFilePointer
WideCharToMultiByte
SetEndOfFile
ReadFile
SetStdHandle
VirtualProtect
GetCPInfo
FlushFileBuffers
GetOEMCP
LCMapStringA
LCMapStringW
user32
GetMessageA
DispatchMessageW
IsWindowUnicode
PeekMessageA
MsgWaitForMultipleObjects
GetMessageW
TranslateMessage
DispatchMessageA
UnregisterClassA
oleaut32
SysAllocStringByteLen
advapi32
SetThreadToken
OpenThreadToken
RevertToSelf
ole32
CoMarshalInterface
CreateStreamOnHGlobal
CoUnmarshalInterface
CoRevokeClassObject
CoRegisterClassObject
CoReleaseMarshalData
Sections
.rda3456 Size: 180KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 380KB - Virtual size: 377KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ