c:\WS\Client\Builds\Runner\1.0.0.0\Release\Runner.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aa247170c462ac61e238f9d5b9eb8dd0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aa247170c462ac61e238f9d5b9eb8dd0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa247170c462ac61e238f9d5b9eb8dd0_JaffaCakes118
-
Size
332KB
-
MD5
aa247170c462ac61e238f9d5b9eb8dd0
-
SHA1
2009116d88b83e647a6f194403d562299baa0dbb
-
SHA256
5f9325d9a80092fb993a367fb03e2df2f45dad2fcbbd2a9f981febdfe681e674
-
SHA512
2a53ea435a24fb3a2163ef60872b52130a575b07d872eff453fa743229d74a5121510ca7824b05ecc1575eb8b77ad64049289e2ca9180ef855df7bffacfe9237
-
SSDEEP
6144:ah0et74KFXJHpKclz9Tj9r0GqsclTn5PT5iUAglD:sXSKFXJHfHTj9rF1cx5V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa247170c462ac61e238f9d5b9eb8dd0_JaffaCakes118
Files
-
aa247170c462ac61e238f9d5b9eb8dd0_JaffaCakes118.exe windows:4 windows x86 arch:x86
8e3cc97222246d30530af8e9795a4c26
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
lstrlenW
lstrlenA
ReadFile
WideCharToMultiByte
CreateFileA
GetModuleFileNameA
CloseHandle
GetFileSize
SetFilePointer
GetTempPathA
Sleep
GetCurrentProcessId
WaitForSingleObject
DeleteFileA
GetTickCount
GetCommandLineA
MultiByteToWideChar
WriteFile
InterlockedExchange
SetEndOfFile
CreateFileW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
CreateThread
TerminateThread
GetVersionExA
GetCurrentProcess
GetProcAddress
GetModuleHandleA
ExpandEnvironmentStringsW
FreeLibrary
LoadLibraryA
InterlockedDecrement
GlobalAlloc
GetMailslotInfo
CreateMailslotA
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetACP
GetLocaleInfoA
GetThreadLocale
HeapAlloc
HeapFree
RaiseException
HeapReAlloc
VirtualAlloc
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcessHeap
GetStartupInfoA
ExitProcess
GetCPInfo
LCMapStringA
LCMapStringW
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
HeapSize
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsA
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
ShellExecuteA
user32
UpdateWindow
DefWindowProcA
PostQuitMessage
ShowWindow
DispatchMessageA
TranslateMessage
CreateWindowExA
RegisterClassA
PostMessageA
GetSystemMetrics
GetMessageA
ole32
CLSIDFromString
CoCreateGuid
StringFromGUID2
oleaut32
SysFreeString
VariantClear
SysAllocString
ws2_32
gethostbyname
htonl
sensapi
IsNetworkAlive
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ