c:\Documents and Settings\Andrew\Desktop\loader\SkyH4x's VIP Private Hook v5.2.3\Loader Source Code\Release\marauder loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a473e939a02bc148c873c706cf8686ba_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a473e939a02bc148c873c706cf8686ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a473e939a02bc148c873c706cf8686ba_JaffaCakes118
-
Size
500KB
-
MD5
a473e939a02bc148c873c706cf8686ba
-
SHA1
deb61187ff1cbdd5db47ec03adcb3155b4d5c040
-
SHA256
2c8647e44591773669fd8a4fdd126d88d37d0c3dd38546f5bd56038e6e7b582c
-
SHA512
daceb713e3e6df74aa31d95920957abe521606bd84c60b50ef0b0159da399990000c910321201e4d744f7b316a95857de1b5ed54d3162d041350d04676a2aa8b
-
SSDEEP
6144:cqek40rNUUVu7gdxKbynsMbCJ9pld1VTSUho/fntEmIDSAyXWI:BeJdsuEde5/lVMntQSyI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a473e939a02bc148c873c706cf8686ba_JaffaCakes118
Files
-
a473e939a02bc148c873c706cf8686ba_JaffaCakes118.exe windows:4 windows x86 arch:x86
5099413ffe76c313622508fe829f86d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
WriteProcessMemory
VirtualAllocEx
OpenProcess
lstrlenW
lstrlenA
GetCurrentProcess
ExitProcess
CreateThread
CreateMutexA
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
ReadFile
SetEndOfFile
SetFilePointer
Sleep
GetModuleHandleA
GetLastError
GetModuleFileNameA
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
InterlockedExchange
VirtualQuery
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
CreateFileA
HeapSize
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
GetSystemInfo
user32
CreateDialogParamA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfW
FindWindowA
GetWindowThreadProcessId
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 460KB - Virtual size: 459KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ