d:\Projects\WinRAR\rar\build\unrar32\Release\UnRAR.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b7886c8fa7dd5a4bfa09db37d7f171d3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7886c8fa7dd5a4bfa09db37d7f171d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7886c8fa7dd5a4bfa09db37d7f171d3_JaffaCakes118
-
Size
300KB
-
MD5
b7886c8fa7dd5a4bfa09db37d7f171d3
-
SHA1
4237b703eaed3c53d9b9c9acd03f97394855a015
-
SHA256
03b66238b7789259942160a7ee6400955a3f8d2e3d422de9e4185642aff59e16
-
SHA512
a7f4c329aaecd4dd42731363d62b72d756475cf25367a60048cb21390d8d26cd01ebd66bd4ee4b292093b19bfcf04e6e773efb92ffad83caba7317f9ecd04635
-
SSDEEP
6144:igpnq2Jz5ZKJlQjjlMocmYWR/o1Q6bN0xiLahv:PpqabGKJMB+6b6xe4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7886c8fa7dd5a4bfa09db37d7f171d3_JaffaCakes118
Files
-
b7886c8fa7dd5a4bfa09db37d7f171d3_JaffaCakes118.exe windows:5 windows x86 arch:x86
a0a0cfdcead0140c903c4313c1428b71
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentDirectoryA
CloseHandle
GetCurrentProcess
SetFileTime
MoveFileA
FlushFileBuffers
SetFilePointer
SetEndOfFile
GetFileType
CreateFileA
CreateFileW
ReadFile
SetLastError
WriteFile
GetDriveTypeA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
GetFullPathNameA
DeleteFileA
DeleteFileW
DeviceIoControl
CreateDirectoryA
CreateDirectoryW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
FindClose
GetLastError
FindFirstFileA
FindNextFileW
FindFirstFileW
GetVersionExA
GetModuleFileNameA
SetErrorMode
FreeLibrary
LoadLibraryA
LoadLibraryExA
CompareStringA
SetThreadPriority
GetCurrentThread
SetPriorityClass
LocalFileTimeToFileTime
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetSystemTime
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
IsDBCSLeadByte
GetCPInfo
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetEnvironmentVariableA
GetLocaleInfoA
FormatMessageA
LocalFree
SetConsoleCtrlHandler
Sleep
GetStdHandle
GetConsoleMode
SetConsoleMode
FindNextFileA
ReadConsoleA
GetStringTypeW
GetStringTypeA
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
GetModuleHandleW
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
RaiseException
HeapSize
GetVersion
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetConsoleCP
user32
CharLowerW
ExitWindowsEx
CharLowerA
LoadStringA
CharUpperA
CharToOemBuffA
CharToOemA
OemToCharA
OemToCharBuffA
CharUpperW
advapi32
RegQueryValueExA
RegCloseKey
SetFileSecurityW
SetFileSecurityA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 65KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE