H:\O63PJCQvjNMLIzeWh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8d5fb457fd4b0ee7c1f4a48b1b237e4d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d5fb457fd4b0ee7c1f4a48b1b237e4d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d5fb457fd4b0ee7c1f4a48b1b237e4d_JaffaCakes118
-
Size
239KB
-
MD5
8d5fb457fd4b0ee7c1f4a48b1b237e4d
-
SHA1
856a30ff7a79d4afd0ee2236458f8842ade7f53b
-
SHA256
4c19811b71794053b99e084bc8a9eba0c73ac5ba90fdfa5d79fb3bd091c8e45f
-
SHA512
43e924988043f0aaf8ec0518e66fcd21ae9297b58dcf028ce6a4cab19b4b856b15fb9cc30b18556b41120235245637616762ff23fd2fe3f3706d5656154aba6e
-
SSDEEP
3072:ozEeJofDPxm7MWclTpGE2IUf24k+1/v09TwR9gBvw4hxbPJ9dEdmB06Y:o4eJofFm7MWykLk+iTwbojV6mB01
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d5fb457fd4b0ee7c1f4a48b1b237e4d_JaffaCakes118
Files
-
8d5fb457fd4b0ee7c1f4a48b1b237e4d_JaffaCakes118.exe windows:5 windows x86 arch:x86
86eb0d689a765289310e2f2017b2de2d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
EnumSystemLocalesA
GetLocaleInfoA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
RaiseException
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
LoadLibraryW
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
FreeLibrary
HeapAlloc
GetProcessHeap
VirtualQuery
FatalAppExitA
SetConsoleCtrlHandler
InterlockedExchange
GetLocaleInfoW
RtlUnwind
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
HeapReAlloc
HeapSize
CreateFileW
CloseHandle
FlushFileBuffers
GetUserDefaultLCID
IsValidLocale
user32
wsprintfA
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ