c:\Documents and Settings\ylabnote\My Documents\Visual Studio 2008\Projects\DummyMalware\Release\DummyMalware.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b3c71bcbbf5e49a5a1d61369a45f124b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b3c71bcbbf5e49a5a1d61369a45f124b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b3c71bcbbf5e49a5a1d61369a45f124b_JaffaCakes118
-
Size
115KB
-
MD5
b3c71bcbbf5e49a5a1d61369a45f124b
-
SHA1
e4161b8e0f7543777ea47f5d734b34ea514ef7e5
-
SHA256
ed9d350268b1b5cdad81666f9cb5b672cc6db9cf47ea0e773004398c0a63f8a9
-
SHA512
d8c158fc133389f5e319f9b7d554d5cc5a828217fff7e3944a79e0def120b39580dac8da7316feb948c052c839cdd2f4320eabadc54fe541357f51020fd20099
-
SSDEEP
1536:AmClUaDsezDVBK7lQwaU543Z/fQIZYiQL5JU+vXfmH5zul5D4Ct:A3UABC7lQFZfVmulul5Dn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3c71bcbbf5e49a5a1d61369a45f124b_JaffaCakes118
Files
-
b3c71bcbbf5e49a5a1d61369a45f124b_JaffaCakes118.exe windows:5 windows x86 arch:x86
b0162331150788e0ea421e1158a7e13d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
connect
WSAStartup
htons
shutdown
WSACleanup
recv
socket
closesocket
gethostbyname
send
kernel32
TlsSetValue
GetProcessHeap
SetEndOfFile
GetLocaleInfoW
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
GetProcAddress
ExitProcess
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetLastError
HeapFree
RtlUnwind
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
SetStdHandle
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
HeapAlloc
SetHandleCount
GetStdHandle
GetStartupInfoA
CloseHandle
TlsGetValue
TlsAlloc
TlsFree
SetLastError
GetCurrentThreadId
GetModuleFileNameA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
FlushFileBuffers
ReadFile
SetFilePointer
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ