D:\Hacks\C++\!!!BOTNET\!!!!!BOTS\PROJECT 1\BOT_INJECT(EXPERT)\Release\BOTNET.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a54960f880d11488d0dd2eb62984acd7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a54960f880d11488d0dd2eb62984acd7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a54960f880d11488d0dd2eb62984acd7_JaffaCakes118
-
Size
153KB
-
MD5
a54960f880d11488d0dd2eb62984acd7
-
SHA1
7ab3af3f051825adb4706915be8ff8468f1ea4e8
-
SHA256
eb33cb8a7ee9929b9836b5643ac23b570c5268f797cd93ff0960e6b1c4a2b49b
-
SHA512
38035f3b2e2a8079105cbdbbd8034e3db3af3275b9d9869e04a622f588daa924d32b64f165c0d8f8a2ba040f807b153dd30b9e9d108e12b37cd4aa48f8751c37
-
SSDEEP
3072:u8KKo//jgxUq/9aOafTIzEubhD5UQToUrQZksVuSx/jbxb:h/OfydbhtUrsq1b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a54960f880d11488d0dd2eb62984acd7_JaffaCakes118
Files
-
a54960f880d11488d0dd2eb62984acd7_JaffaCakes118.exe windows:5 windows x86 arch:x86
afaf51b679bba955d5d3b8d35576a805
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
Sleep
CopyFileExA
SetFileAttributesA
GetEnvironmentVariableA
CreateFileA
WriteFile
CloseHandle
CreateProcessA
LoadLibraryA
GetCurrentThread
GetCurrentProcess
VirtualAlloc
VirtualProtect
VirtualFree
OpenProcess
TerminateProcess
FindFirstFileA
Process32First
lstrcmpiA
Process32Next
HeapAlloc
GetProcessHeap
HeapFree
GetFileSize
ReadFile
VirtualAllocEx
IsDebuggerPresent
DebugBreak
GetTempPathA
FreeLibrary
GetComputerNameA
WriteConsoleW
DecodePointer
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetModuleFileNameA
GetSystemInfo
GetModuleHandleA
GetProcAddress
VerifyVersionInfoW
VerSetConditionMask
CreateToolhelp32Snapshot
GetVersionExA
GetConsoleCP
HeapSize
GetStringTypeW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExA
MoveFileExW
HeapReAlloc
GetFileType
LCMapStringW
CreateFileW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
GetACP
GetCommandLineW
GetCommandLineA
GetStdHandle
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
GetModuleHandleW
EncodePointer
RaiseException
GetLastError
SetLastError
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
user32
SendMessageA
FindWindowA
FindWindowExA
wsprintfA
advapi32
RegQueryValueExA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
GetUserNameA
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
ShellExecuteA
ole32
CoCreateInstance
CoInitialize
CoCreateGuid
psapi
GetModuleBaseNameA
GetModuleFileNameExA
EnumProcessModules
EnumProcesses
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
netapi32
NetApiBufferFree
NetWkstaGetInfo
wininet
InternetOpenA
InternetConnectA
DeleteUrlCacheEntry
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
urlmon
URLDownloadToFileA
ObtainUserAgentString
ntdll
NtClose
NtResumeThread
NtSetContextThread
NtWriteVirtualMemory
NtUnmapViewOfSection
NtReadVirtualMemory
NtGetContextThread
NtTerminateProcess
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ