d:\bin_rel\сtfmon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bbf3590466c26c32ec2c7e44be37dd82_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bbf3590466c26c32ec2c7e44be37dd82_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bbf3590466c26c32ec2c7e44be37dd82_JaffaCakes118
-
Size
28KB
-
MD5
bbf3590466c26c32ec2c7e44be37dd82
-
SHA1
2b18f6b6a71cb05d13ade5fb679d9f994546b1f4
-
SHA256
e64de6f0d44dccdf6686bea01f7f8787d35c0241ff3635c4af5f7525d5113bab
-
SHA512
760a48ef175ff5116b07051ee9cedf612765ddcc9e7d17bd834b4f00871c1b224ccd49fe4b5a9022fe6652aab52f34ea0364da4f1e4457d64f5c43c0f2c181f3
-
SSDEEP
384:mjn6d7eTj9PMpQpTUzVB+r0z5q8u6+C60W6vs:mjn6d7eP9TTUzX+r0z5q/dSQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbf3590466c26c32ec2c7e44be37dd82_JaffaCakes118
Files
-
bbf3590466c26c32ec2c7e44be37dd82_JaffaCakes118.exe windows:4 windows x86 arch:x86
ea994c9f3cb21819c07bf0665fc1a08d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
closesocket
shutdown
connect
setsockopt
inet_addr
htons
socket
WSACleanup
inet_ntoa
gethostbyname
gethostname
WSAStartup
recv
send
kernel32
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
GetLastError
CreateFileA
ReadFile
CloseHandle
WriteFile
CopyFileA
Sleep
DeleteFileA
GetLogicalDriveStringsA
CreateMutexA
user32
SetTimer
GetMessageA
DefWindowProcA
DispatchMessageA
RegisterClassExA
TranslateMessage
CreateWindowExA
PostQuitMessage
shell32
ShellExecuteA
wininet
InternetConnectA
FtpOpenFileA
InternetReadFile
InternetCloseHandle
InternetWriteFile
FtpGetFileA
FtpPutFileA
InternetOpenA
msvcr80
_findfirst64i32
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_crt_debugger_hook
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
memcpy
strlen
strcat
strcpy
memset
_findnext64i32
_findclose
fopen
fwrite
fclose
strcmp
fread
??2@YAPAXI@Z
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 19.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ