d:\projects\heaps\heap_restyle\release\heap_our.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a0ad0c7a3871ae9b4dd470e3b1ff4b82_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a0ad0c7a3871ae9b4dd470e3b1ff4b82_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a0ad0c7a3871ae9b4dd470e3b1ff4b82_JaffaCakes118
-
Size
80KB
-
MD5
a0ad0c7a3871ae9b4dd470e3b1ff4b82
-
SHA1
0e2a96f0fc47f5ded822c83ce4e406e452f3cf78
-
SHA256
df353b135c2cf94fc59e761c47c6e7912c12d8c7a82db7712382083e2036e402
-
SHA512
f382cc473881a3c146e9e0f2d37dc87e4794b73bf55eed086ab8c61e79131b1b074311ade100416d73c0ae48a513c1606b46243d39ced53b0f9eda8b814c4901
-
SSDEEP
768:z8va4liMWEqCEWVAQmY687SA5jZWB8AC7CXieCiog+vlpHThSgaPzRkSAJ6lveNs:z8vauixY69nBv6djI7kD6Fm7e9tR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0ad0c7a3871ae9b4dd470e3b1ff4b82_JaffaCakes118
Files
-
a0ad0c7a3871ae9b4dd470e3b1ff4b82_JaffaCakes118.exe windows:4 windows x86 arch:x86
ff640fa66a1290e21015af66ba574836
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateThread
CreateMutexA
GetLastError
OpenMutexA
CloseHandle
Sleep
ExitProcess
GetCommandLineA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetSystemTimeAsFileTime
HeapDestroy
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
ExitThread
WideCharToMultiByte
lstrcpyA
LocalFree
lstrcmpiA
GetProcAddress
LoadLibraryA
lstrcatA
lstrlenA
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
GetWindowsDirectoryA
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
UnmapViewOfFile
lstrlenW
GetTickCount
lstrcmpA
HeapCreate
HeapAlloc
HeapReAlloc
IsBadReadPtr
HeapFree
IsBadWritePtr
GetCurrentThreadId
WaitForSingleObject
QueryPerformanceCounter
GetExitCodeThread
GetEnvironmentVariableA
WriteFile
ReadFile
FreeLibrary
SetEvent
VirtualFree
InitializeCriticalSection
TerminateThread
CreateEventA
LeaveCriticalSection
VirtualAlloc
EnterCriticalSection
WaitForMultipleObjects
DeleteCriticalSection
GetProcessHeap
IsBadStringPtrA
OutputDebugStringA
FindClose
FindNextFileA
FindFirstFileA
GetModuleHandleA
GetVersion
GetCurrentProcessId
GetVersionExA
GetStartupInfoA
GetCurrentDirectoryA
SetCurrentDirectoryA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
user32
wsprintfA
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegEnumValueA
RegOpenKeyA
mapi32
ord11
ord21
ord140
ord75
ord19
ord17
ord23
shlwapi
wnsprintfA
StrStrIA
StrStrA
ws2_32
htons
connect
send
gethostbyname
closesocket
WSAStartup
WSACleanup
setsockopt
inet_addr
accept
listen
bind
htonl
WSASocketA
WSARecv
inet_ntoa
gethostname
socket
WSAIoctl
recv
shell32
SHGetFolderPathA
ord64
ole32
CoTaskMemFree
CreateStreamOnHGlobal
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ