C:\projects\fcrypt\Release\S\s_high.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a5b14a0f822f3cb69a1c98f68fdb5824_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a5b14a0f822f3cb69a1c98f68fdb5824_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a5b14a0f822f3cb69a1c98f68fdb5824_JaffaCakes118
-
Size
457KB
-
MD5
a5b14a0f822f3cb69a1c98f68fdb5824
-
SHA1
053d6f83fd1ca529314c5cc41662b6ebfbb7ce9e
-
SHA256
61d514776abf773337edd74d775cef108ae46524f3216a3b4078268ce31fa265
-
SHA512
3e9eeefd568dc39a673c0d060ff3a2e6a971d6be050ffa5f830ded0b837e13406e797a622a309653ed857128953e07fd4ddd3ca44f97a3c74c52c248bfb2dd58
-
SSDEEP
12288:aUdxYXpY6LF/LeVKBSLyE6+nA93R6ZxhYX:aUcXpY6ZzYKBFE6gA9hMhq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5b14a0f822f3cb69a1c98f68fdb5824_JaffaCakes118
Files
-
a5b14a0f822f3cb69a1c98f68fdb5824_JaffaCakes118.exe windows:5 windows x86 arch:x86
a3d6016c350bfa51ad4df42599b5c10b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
wcsstr
wcscat
_wcsupr
malloc
_wcsicmp
free
_wtoi
wcschr
memmove
_except_handler3
_wtol
wcsncpy
wcscmp
iswctype
wcslen
wcscpy
kernel32
GetProcAddress
LoadLibraryA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
WideCharToMultiByte
GetLastError
GetOEMCP
MultiByteToWideChar
GlobalUnlock
GlobalLock
GlobalAlloc
FreeResource
SizeofResource
LockResource
LoadResource
GlobalFree
FreeLibrary
CloseHandle
GetNumberFormatA
GetFileSize
FileTimeToSystemTime
GetFileTime
GetUserDefaultLCID
GetVersionExA
lstrlenW
user32
EnableWindow
GetDlgItem
CheckRadioButton
GetWindowRect
MoveWindow
GetParent
EndDialog
GetDesktopWindow
SetFocus
CheckDlgButton
MessageBeep
IsDlgButtonChecked
ShowWindow
advapi32
RegQueryValueExA
RegCloseKey
RegFlushKey
RegOpenKeyExA
sqlunirl
_SetWindowText@8
_GetUnicodeRedirectionLayer@0
_GetModuleFileName@12
_CreateFile@28
_GetProcAddress_@8
_LoadLibrary@4
_GetWindowTextLength@4
_SendDlgItemMessage@20
_LoadIcon@8
_FindResource@12
_SetDlgItemText@12
_MAKEINTRESOURCE@4
_PostMessage@16
_SendMessage@16
_SetProp@12
_RemoveProp@8
_MessageBox@16
_GetWindowLong@8
_SetWindowLong@12
_CallWindowProc@20
_CharUpper@4
_GetWindowText@12
_LoadString@16
_GetProp@8
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 988B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 428KB - Virtual size: 427KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 1024B - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 70B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 70B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ