C:\Users\Harish\Desktop\Crypt\CyberPunkCrypter\Release\MyStub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a6dd8dade62e8b742e04cbbe68b5bec7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6dd8dade62e8b742e04cbbe68b5bec7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6dd8dade62e8b742e04cbbe68b5bec7_JaffaCakes118
-
Size
130KB
-
MD5
a6dd8dade62e8b742e04cbbe68b5bec7
-
SHA1
b78a77fc3b8ef11cfe67c9daa3397978dc892f36
-
SHA256
927611c1a1a36ea9ec6a3a42fc01adb0579bf1c260b5a4cb0bc7a5471831a82c
-
SHA512
7163c04463982c3abeb2862029e0a88cd17624c923f256bfb38ab818a13b7cfed2759de960aa051295b4ea50fdf0290efa6e8a36c3ab0ae6fd5645146ee87eb1
-
SSDEEP
1536:JVdE60bbsm9NsE/7+Vn/pp06ZtuybS3JknAXOYEqVXeueAVCyk6ACnoBBNVWRfW2:JH4917+jptwRO1AViX/VKeE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6dd8dade62e8b742e04cbbe68b5bec7_JaffaCakes118
Files
-
a6dd8dade62e8b742e04cbbe68b5bec7_JaffaCakes118.exe windows:5 windows x86 arch:x86
27a86106f68939687c499d34b9f64a50
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetModuleFileNameA
GetProcAddress
CreateFileA
SetFilePointer
ReadFile
CloseHandle
GetProcessHeap
SetEndOfFile
CreateFileW
SetStdHandle
WriteConsoleW
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetLastError
HeapFree
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
DecodePointer
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
HeapCreate
RaiseException
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
LoadLibraryW
GetLocaleInfoW
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetStringTypeW
InitializeCriticalSection
shell32
ShellExecuteA
SHGetSpecialFolderPathA
wininet
HttpQueryInfoA
InternetAttemptConnect
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ