d:\Works\ByShell_Up56\WinStart\Release\WinStart.pdb
Static task
static1
Behavioral task
behavioral1
Sample
afc4a7fed46a5f8816ab620820a931f0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
afc4a7fed46a5f8816ab620820a931f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
afc4a7fed46a5f8816ab620820a931f0_JaffaCakes118
-
Size
244KB
-
MD5
afc4a7fed46a5f8816ab620820a931f0
-
SHA1
51744dda7f16a980650d42e3e83c0e57dcf2b3ed
-
SHA256
7ab64406299c83ddd059a4886f1033c7d952143029708c68b92c8bc6b8966ec5
-
SHA512
9d7eff1d5e66d3cd340adbee40c791408cc8f2e8cb290ae68fc3790accac108b0688a146df70a3936004a94c3a59ec48b1d96d757ac03adb4a729fdd29a3d761
-
SSDEEP
3072:FQ3Ld2lMobvC2cLLLhn1e30i/afOkReKleb4lvgnp:e5QbmN1Q0iSfO/Fb4typ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afc4a7fed46a5f8816ab620820a931f0_JaffaCakes118
Files
-
afc4a7fed46a5f8816ab620820a931f0_JaffaCakes118.exe windows:4 windows x86 arch:x86
817cd0e801106be4f2330e1dcb81b86e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileTime
CloseHandle
CreateFileW
DeleteFileW
GetPrivateProfileStringW
WriteFile
LockResource
LoadResource
SizeofResource
FindResourceA
lstrlenW
GetTempPathW
GetSystemDirectoryW
GlobalFree
GlobalAlloc
CopyFileW
ResumeThread
CreateProcessW
SetThreadPriority
SetFileTime
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableW
GetShortPathNameW
GetModuleFileNameW
CreateFileA
GetSystemDirectoryA
ExitProcess
GetProcAddress
LoadLibraryW
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetSystemInfo
VirtualProtect
GetCPInfo
GetOEMCP
GetStringTypeW
GetTickCount
GetLastError
InterlockedExchange
GetProcessHeap
HeapAlloc
HeapFree
Sleep
lstrcpyW
lstrcatW
DeleteCriticalSection
InitializeCriticalSection
GetLocaleInfoA
GetACP
GetCurrentThread
GetStringTypeA
LoadLibraryA
GetVersionExA
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
VirtualQuery
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
TerminateProcess
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
user32
RegisterClassExW
CreateWindowExW
ShowWindow
UpdateWindow
DefWindowProcW
wsprintfW
advapi32
RegOpenKeyExW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
OpenServiceA
StartServiceW
SetServiceStatus
EnumDependentServicesW
OpenServiceW
QueryServiceStatus
ControlService
DeleteService
OpenSCManagerW
CreateServiceW
CloseServiceHandle
RegSetValueExW
RegCloseKey
shlwapi
PathRemoveFileSpecW
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 204KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ