e:\DebugBmw1.0\BMW\release\Loader91.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b39dd7663d6c45f374cedb93359f1182_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b39dd7663d6c45f374cedb93359f1182_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b39dd7663d6c45f374cedb93359f1182_JaffaCakes118
-
Size
52KB
-
MD5
b39dd7663d6c45f374cedb93359f1182
-
SHA1
4301f3e3d7efc127f08899d1624466dd9b9c58b4
-
SHA256
98d442f3559aee986a3f5fa44e2565756f3bfdf6c16acce06a779b89b486f212
-
SHA512
e5e578e3acf31101c6c359bc1775733e02feae7f815ef0b344b2646764054464677ea512c85ee6fccebbf0ae4625898c60a0e05c3b9fe1bd77857c744eea8f4a
-
SSDEEP
768:DS8D6DXP0X8I7Q2OB2E6YFwJUUb3Q/NUPaIFAduCjp/l+t+:DSlrPAOB2E6YeJ53q8I7l8t+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b39dd7663d6c45f374cedb93359f1182_JaffaCakes118
Files
-
b39dd7663d6c45f374cedb93359f1182_JaffaCakes118.exe windows:4 windows x86 arch:x86
699b0ffc61b6e8fa78f9473c5b0e558a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadResource
GlobalAlloc
LockResource
CreateFileW
CloseHandle
SetFilePointer
WriteFile
GlobalFree
GetSystemDirectoryW
GetShortPathNameW
GetStartupInfoW
SizeofResource
WaitForSingleObject
TerminateProcess
GetModuleFileNameW
SetPriorityClass
GetCurrentProcess
SetThreadPriority
GetCurrentThread
SetProcessPriorityBoost
MultiByteToWideChar
FindResourceExW
FindResourceW
DeleteFileW
CreateProcessW
CreateDirectoryW
Sleep
DeleteCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
InterlockedCompareExchange
GetLocaleInfoA
GetACP
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteW
ShellExecuteExW
SHChangeNotify
ole32
CoUninitialize
CoCreateInstance
CoInitialize
shlwapi
PathFileExistsW
msvcr80
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
free
memmove_s
memcpy_s
wcsncpy_s
wcscat_s
??3@YAXPAX@Z
_CxxThrowException
__CxxFrameHandler3
memset
memcpy
user32
UnregisterClassA
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ