C:\Users\Innab\documents\visual studio 2010\Projects\screen\Release\screen.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b89c50a340f7415ccfb9889e6b1efc8c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b89c50a340f7415ccfb9889e6b1efc8c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b89c50a340f7415ccfb9889e6b1efc8c_JaffaCakes118
-
Size
174KB
-
MD5
b89c50a340f7415ccfb9889e6b1efc8c
-
SHA1
5d63ddf6c94b1f35c780dd62ebdd4ea7412fef9d
-
SHA256
0428d1a505986aa10a96f83e2283ff200034010c6e1ed2147a92b30529a47ed6
-
SHA512
3fe6fe1a793cd6c27505e83f59c5c8e93d7ace7d826395d64c5c27508a4416bb21169a24a2ad2932f1ab8f0f6a228f277647d920c5f0b37b6c84d20edde45c1f
-
SSDEEP
3072:rEJk2pb0Qzere9cZEtbJs0yvA35uKQa2zIEdi5:rEO2p0QSOL5JjyvApMJkCi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b89c50a340f7415ccfb9889e6b1efc8c_JaffaCakes118
Files
-
b89c50a340f7415ccfb9889e6b1efc8c_JaffaCakes118.exe windows:5 windows x86 arch:x86
0e042876f814003cc04955c1ca580c46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeleteFileA
GetLocalTime
GetModuleHandleA
GetWindowsDirectoryA
GetSystemDirectoryA
GetEnvironmentVariableA
GetModuleFileNameA
GetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
FindNextFileA
CreateFileA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
FindClose
CopyFileA
GetLogicalDriveStringsA
ReadFile
FindFirstFileA
Sleep
GetDriveTypeA
OpenFile
GetFileSize
CreateThread
CloseHandle
GetLastError
CreateFileW
GetCurrentProcess
GetLocaleInfoA
GetUserDefaultLCID
GetLocaleInfoW
GetStringTypeW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetFileAttributesA
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
IsProcessorFeaturePresent
HeapCreate
GetProcAddress
GetModuleHandleW
ExitProcess
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetProcessHeap
user32
GetDC
SendInput
GetWindowRect
GetDesktopWindow
DispatchMessageA
SetWindowsHookExA
GetWindowTextA
GetCursorPos
UnhookWindowsHookEx
GetMessageA
GetKeyNameTextA
GetKeyState
CallNextHookEx
TranslateMessage
GetForegroundWindow
gdi32
CreateDIBSection
SelectObject
CreateCompatibleDC
BitBlt
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
ws2_32
send
closesocket
socket
recv
WSACleanup
WSAGetLastError
getaddrinfo
WSAStartup
connect
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ