c:\Projects\NSISGames\MCEWrapperSrc\Release\MCEWrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a800e96d09d84823ea02d8db28fc7279_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a800e96d09d84823ea02d8db28fc7279_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a800e96d09d84823ea02d8db28fc7279_JaffaCakes118
-
Size
9KB
-
MD5
a800e96d09d84823ea02d8db28fc7279
-
SHA1
61331f223fa3c78afb28d57449e42901292997b7
-
SHA256
fa50f4d0e4264f7c37dbd086db3ec68c9b94bc1fd083824fd43ec11dbdb56bb3
-
SHA512
e599b03bc0aeae1cd2a10c3c2fe0e20cd2a256fc331f85e7c4faa694a9c0a5cc1e6ccefb4333dcce86669969d15d05ac288b1c962876aa5f3ccab0efd51ccf23
-
SSDEEP
192:vjb4RMB+XOZzd+K43DKYL8WVCkMTcWdzOqKpUM:vjb4kMK43+YL8aMTJZOT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a800e96d09d84823ea02d8db28fc7279_JaffaCakes118
Files
-
a800e96d09d84823ea02d8db28fc7279_JaffaCakes118.exe windows:4 windows x86 arch:x86
9138c06e21885f2b8876e9ac81ea57a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ddraw
DirectDrawCreate
shlwapi
PathFileExistsW
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetLastError
CloseHandle
ResumeThread
ExpandEnvironmentStringsW
CreateJobObjectW
AssignProcessToJobObject
SetInformationJobObject
GetModuleHandleW
GetModuleFileNameW
GetFullPathNameW
ExitProcess
CreateIoCompletionPort
CreateProcessW
GetQueuedCompletionStatus
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
CreateWindowExW
DispatchMessageW
PeekMessageW
MessageBoxW
RegisterClassW
LoadIconW
TranslateMessage
DefWindowProcW
shell32
ShellExecuteW
msvcr80
??2@YAPAXI@Z
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
??3@YAXPAX@Z
memset
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE