k:\Programmieren\Codesoft Releases\Beta Hardware-ID\Infinty Binder\bostongeorg Version\stub\Release\stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b4ab406c3a10064f6a12d3c8b0b0f684_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4ab406c3a10064f6a12d3c8b0b0f684_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b4ab406c3a10064f6a12d3c8b0b0f684_JaffaCakes118
-
Size
132KB
-
MD5
b4ab406c3a10064f6a12d3c8b0b0f684
-
SHA1
f593def17c388ea9d7f064617384a72ef7877226
-
SHA256
728c747cccba39c8add4bcab7b37387101f6dcb7ab7c341f2754340a9f6d2a94
-
SHA512
4fdc6d378c14611894523f6212580fc79cfebfcbd29377abb5f4965b34a9a946b8d0b75cd3ceb06dfbf7b90ad50468c6cb0b900fc75bebc2595afbfeabd2fae2
-
SSDEEP
1536:QJ8Ad7DTWvhpBJ9lgtq0WSH7VLcCxG4yf2cNgYev8Pov9bUrcWt3M:CQnBJ/gVcuGp0bccWt3M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4ab406c3a10064f6a12d3c8b0b0f684_JaffaCakes118
Files
-
b4ab406c3a10064f6a12d3c8b0b0f684_JaffaCakes118.exe windows:4 windows x86 arch:x86
f53100fa429714a02c0772059997753c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateToolhelp32Snapshot
lstrcpyA
lstrlenA
GetEnvironmentVariableA
lstrcatA
GetShortPathNameA
GetProcAddress
GetModuleHandleA
Sleep
GetTempPathA
GetCurrentDirectoryA
GetWindowsDirectoryA
GetSystemDirectoryA
GetModuleFileNameA
Process32First
Module32First
Module32Next
LoadLibraryA
Process32Next
SetEndOfFile
CreateFileW
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
GetLocaleInfoW
user32
wsprintfA
advapi32
RegSetValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
shell32
ShellExecuteA
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ