g:\Projects\Process\Process\Release\Process.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b1bd9528b03b76797a9dda04b855cfd1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b1bd9528b03b76797a9dda04b855cfd1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1bd9528b03b76797a9dda04b855cfd1_JaffaCakes118
-
Size
48KB
-
MD5
b1bd9528b03b76797a9dda04b855cfd1
-
SHA1
c6ec73622b9ab89fa0ae9c581d0e78d0869eef93
-
SHA256
b4a861883b335c4470303c39cefb9d4e5b0a3cf88626f152f2f979aff6c8340b
-
SHA512
37bca7e32190349072762e9d2bc65deda11954988bbc5f2c5ed0a2d44eae82b9769fa9ecef6ae2a61dcd98dc2ac234b901265b0ab46ba15184fd8bf8dc2a2d18
-
SSDEEP
768:IRWMA68kDGXcK1JP9COApZsLUFDeLHAwu0aB0wWYS/a/x9GYDM0+0:IkMKH9fApDFPgiKMM0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1bd9528b03b76797a9dda04b855cfd1_JaffaCakes118
Files
-
b1bd9528b03b76797a9dda04b855cfd1_JaffaCakes118.exe windows:4 windows x86 arch:x86
674ead00063f238494b4725620612b42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
GetProcessAffinityMask
OpenProcess
Sleep
TerminateProcess
WaitForSingleObject
SetPriorityClass
lstrcmpiA
HeapFree
ResumeThread
SuspendThread
GetVersionExA
WideCharToMultiByte
HeapAlloc
CloseHandle
GlobalFree
GlobalAlloc
FileTimeToSystemTime
SystemTimeToFileTime
GetSystemTime
LocalFree
FormatMessageA
HeapSize
RtlUnwind
LCMapStringW
LCMapStringA
VirtualQuery
GetSystemInfo
SetProcessAffinityMask
LoadLibraryA
GetProcAddress
FreeLibrary
GetProcessHeap
GetCurrentProcess
ExitProcess
GetModuleHandleA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetACP
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
GetLocaleInfoA
VirtualProtect
SetStdHandle
user32
CloseDesktop
EnumDesktopWindows
GetWindowThreadProcessId
PostMessageA
OpenDesktopA
advapi32
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetTokenInformation
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE