f:\projects\crypt\new level\Release\level.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9473f4e1661391d925d02206d3cfddbb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9473f4e1661391d925d02206d3cfddbb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9473f4e1661391d925d02206d3cfddbb_JaffaCakes118
-
Size
106KB
-
MD5
9473f4e1661391d925d02206d3cfddbb
-
SHA1
0476c5bb90183448b01fc38ee857ae7d6712fbfc
-
SHA256
c161fb68783d4e84da41bbfb0e355b6a282845c6ef1d78f058fd59309daf5eef
-
SHA512
c2b453a7e59b2904c36a574a1179200fb8a7cdaddb5b6883a41015b748969ad297683289ab309bdb58625d54b322ac48902251e6b0084bc9e2fd4dfe5177edad
-
SSDEEP
3072:lTSWs/yV4eGFPNDwZK11weoyoHTkNyWb6E0f:xK/q4e0Bw0CxcyWb6E0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9473f4e1661391d925d02206d3cfddbb_JaffaCakes118
Files
-
9473f4e1661391d925d02206d3cfddbb_JaffaCakes118.exe windows:5 windows x86 arch:x86
530f441a55dc89038087d94b6719112c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
GetModuleHandleA
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
GetCommandLineA
GetTickCount
GetLastError
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
lstrcatA
lstrcmpiA
lstrlenA
lstrcpyA
lstrlenW
lstrcmpiW
VirtualAlloc
UnhandledExceptionFilter
Sleep
SetLastError
ReadFile
QueryPerformanceCounter
MultiByteToWideChar
LocalFree
LocalAlloc
LoadLibraryW
LoadLibraryA
HeapDestroy
GetVersionExA
GetSystemTimeAsFileTime
GetModuleHandleW
GetModuleFileNameW
GetModuleFileNameA
FreeLibrary
DisableThreadLibraryCalls
CreateThread
CreateFileW
CreateEventW
CloseHandle
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
user32
SetTimer
SetForegroundWindow
SetFocus
SetDlgItemTextW
SetCursor
SendMessageW
SendDlgItemMessageW
ReleaseDC
PostQuitMessage
PostMessageW
PeekMessageW
MessageBoxW
LoadStringW
LoadIconW
LoadCursorW
KillTimer
IsWindow
IsDlgButtonChecked
InvalidateRect
SetWindowLongW
GetWindowLongW
GetSystemMetrics
GetSysColor
GetParent
GetFocus
GetDlgItem
GetDesktopWindow
GetDC
GetClientRect
EndPaint
EndDialog
EnableWindow
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
CreateWindowExW
CharNextW
BeginPaint
SetWindowPos
SetWindowTextW
ShowWindow
GetWindowRect
wsprintfA
wsprintfW
TranslateMessage
msvcr90
memset
memcpy
_crt_debugger_hook
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ