C:\Users\Rob\Desktop\Crypter\2011-04-17-A\2011-04-17-A\Debug\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
abc4a4cadd5eb8e2ea15bfdd0102b0b4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
abc4a4cadd5eb8e2ea15bfdd0102b0b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
abc4a4cadd5eb8e2ea15bfdd0102b0b4_JaffaCakes118
-
Size
871KB
-
MD5
abc4a4cadd5eb8e2ea15bfdd0102b0b4
-
SHA1
d5a334d46417e36835f9fe5046cd2b666d7807c2
-
SHA256
1a7fe7522d7e2fdd5f320a1c7d72851ed944ce88e8c295463a52ce64933b1d6c
-
SHA512
a245eb7f8a03b3c13299504c1b59439ea8b6c97ca3d782ba5f928944d9e815c128d2b7f2647d44c0732d48f38fbf389d87a5e09aceca63eff7089b4d5215982c
-
SSDEEP
24576:BQAHQ2CYrJvlEvt/gjTYX0x90qSm7azCcp:BQIxl44jTYX0gOOCcp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abc4a4cadd5eb8e2ea15bfdd0102b0b4_JaffaCakes118
Files
-
abc4a4cadd5eb8e2ea15bfdd0102b0b4_JaffaCakes118.exe windows:5 windows x86 arch:x86
68b7e7188720561a03084fa1952e52a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeResource
GlobalAlloc
GlobalFree
CloseHandle
ReadFile
GetFileSize
CreateFileA
LoadLibraryA
GetModuleHandleA
VirtualAlloc
GetProcAddress
IsBadReadPtr
VirtualProtect
VirtualFree
WaitForSingleObject
CreateThread
GetCommandLineA
GetStartupInfoA
IsDebuggerPresent
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
HeapValidate
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetLastError
GetCurrentThread
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
WriteFile
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
InitializeCriticalSectionAndSpinCount
HeapSize
HeapReAlloc
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryW
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
InterlockedExchange
GetTimeZoneInformation
GetLocaleInfoW
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
Sections
.textbss Size: - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 430KB - Virtual size: 429KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ