c:\bld_area\cc\Common_Client_352\src\r3.5.2\bin\bin.ira\OPScan.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ba7b39fd6a0c45ca4381af189f53749a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ba7b39fd6a0c45ca4381af189f53749a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba7b39fd6a0c45ca4381af189f53749a_JaffaCakes118
-
Size
141KB
-
MD5
ba7b39fd6a0c45ca4381af189f53749a
-
SHA1
3ddd13c6eaf45efec89875ce652f79835bc039fe
-
SHA256
c791bdd8908403c8491f6f92d5a47c8e410ca7b5c0eb850bab977700431f99a9
-
SHA512
069ca76eaceec4f38c64b1d7731be2099097b6d276fb7b5430b2964b92de58f9aa63804327e8a72124a2c9712c449843ec013e4d9427497b8ea85752f641b5e9
-
SSDEEP
3072:dbzWIl+ne8h+Cbm8b71u1SdltqdSew4KdDZPtwDua1T:lWIl4tXb71u1W/qs4K9BK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba7b39fd6a0c45ca4381af189f53749a_JaffaCakes118
Files
-
ba7b39fd6a0c45ca4381af189f53749a_JaffaCakes118.exe windows:4 windows x86 arch:x86
2a3256555fd67e613f41704c7f4f3fec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeLibrary
GetProcAddress
LoadLibraryA
CloseHandle
WaitForSingleObject
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrlenA
lstrcmpiA
Sleep
CreateThread
CreateEventA
lstrcpynA
lstrcpyA
GetModuleFileNameA
lstrcatA
SetEvent
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetCommandLineA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
LockResource
FindResourceExA
LocalAlloc
FormatMessageA
GetSystemDirectoryA
GetFileAttributesA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
ExitProcess
GetStartupInfoA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
user32
PostThreadMessageA
CharNextA
CharUpperA
wsprintfA
TranslateMessage
DispatchMessageA
GetMessageA
CharPrevA
shell32
SHGetSpecialFolderPathA
ole32
CoUninitialize
CoSuspendClassObjects
CoRegisterClassObject
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoResumeClassObjects
CoRevokeClassObject
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
LoadTypeLi
VarUI4FromStr
UnRegisterTypeLi
RegisterTypeLi
shlwapi
PathRemoveBackslashA
PathAddBackslashA
PathFindExtensionA
msvcp71
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?_Nomemory@std@@YAXXZ
msvcr71
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_strcmpi
_cexit
_ismbblead
__setusermatherr
_exit
_c_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_callnewh
memset
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__security_error_handler
_XcptFilter
_controlfp
sprintf
??1exception@@UAE@XZ
??0exception@@QAE@XZ
__CxxFrameHandler
??3@YAXPAX@Z
??0exception@@QAE@ABV0@@Z
_CxxThrowException
malloc
free
_resetstkoflw
_except_handler3
??_V@YAXPAX@Z
wcsncpy
realloc
_purecall
_mbsinc
_splitpath
_mbsrchr
_mbscmp
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE