dinotify.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a55b5dd177e7188894826b5f97f0adc5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a55b5dd177e7188894826b5f97f0adc5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a55b5dd177e7188894826b5f97f0adc5_JaffaCakes118
-
Size
26KB
-
MD5
a55b5dd177e7188894826b5f97f0adc5
-
SHA1
86b71d3db194231572c9929791191ef0dbd08893
-
SHA256
f193d8ced37aef51b40e15e03cc2f510419720f512bd557eb20877f257fa4810
-
SHA512
e8e9acab3c0819629008326eb48df9f1267b8a5c158900893952d628c3b49f411dc72bc6b122f4bf2f85e944888f648bbfb713fd7eceec0f4489adc4bca2bb35
-
SSDEEP
384:ug0xvlsV+kWkJ7WkrCsijybPDzSGS+263Rr9DcJKxBjrWEGUXq3uBHj:fgW+wLW7jaDzP0afDcJKxSoUuZj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a55b5dd177e7188894826b5f97f0adc5_JaffaCakes118
Files
-
a55b5dd177e7188894826b5f97f0adc5_JaffaCakes118.exe windows:6 windows x86 arch:x86
d9e9733c9e3bca17da8124ddf2ba24a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcmpW
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
UnhandledExceptionFilter
msvcrt
_controlfp
_except_handler4_common
__wgetmainargs
_cexit
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
pnpui
SimplifiedDINotificationW
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE