I:\train\train\train\release\train.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bc4b1287664bc7e4e32c0b79818fa620_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc4b1287664bc7e4e32c0b79818fa620_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc4b1287664bc7e4e32c0b79818fa620_JaffaCakes118
-
Size
309KB
-
MD5
bc4b1287664bc7e4e32c0b79818fa620
-
SHA1
63866616030bf13423c10d8fa7becb9ef00220bd
-
SHA256
16520e04eaa76f03b96fbd6724e8884b81b20b2638dd98e2b891e6088aa4e7b3
-
SHA512
3b77d5895a321f4618cd540739b71295ab98f7ba95d4dc19790b2f5ceed4722c6b0390d90e445e71b1e7da92b48f7341ba8e1caef44d6aac3c15734da7332e92
-
SSDEEP
6144:IeFmn0iy1hTY8Z6ZksWqHoLhuFBBNndJU1f:Kn0iy1hTYCoksWqQhuFBBNnjU1f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc4b1287664bc7e4e32c0b79818fa620_JaffaCakes118
Files
-
bc4b1287664bc7e4e32c0b79818fa620_JaffaCakes118.exe windows:5 windows x86 arch:x86
c872c2ff46da121f21e175a760b74671
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapAlloc
GetLogicalDrives
GetCurrentDirectoryW
HeapCreate
GetProcessHeap
LeaveCriticalSection
EnterCriticalSection
GetCurrentThread
InitializeCriticalSection
GetExitCodeProcess
CreateFileW
CloseHandle
lstrcpynA
WriteConsoleW
SetStdHandle
GetStringTypeW
LCMapStringW
SetFileTime
HeapReAlloc
MultiByteToWideChar
HeapSize
GetConsoleMode
GetConsoleCP
SetFilePointer
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
LocalAlloc
FormatMessageA
SetFileAttributesA
ExitProcess
GetLastError
GetComputerNameW
DeleteFileA
GetTempFileNameA
GetFileTime
GetSystemInfo
LocalFree
Sleep
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
LoadLibraryW
WaitForSingleObject
FlushFileBuffers
DeleteFileW
RaiseException
RtlUnwind
GetProcAddress
GetModuleHandleW
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapFree
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetModuleFileNameW
user32
GetWindowLongA
DestroyAcceleratorTable
GetLastActivePopup
IsWindowVisible
ReleaseDC
SetRect
LoadMenuA
GetSubMenu
LoadCursorA
SystemParametersInfoA
LoadStringA
AppendMenuW
GetWindow
SendDlgItemMessageW
SendMessageA
BeginPaint
MoveWindow
EnumWindowStationsW
IsWindow
IsClipboardFormatAvailable
IsIconic
GetParent
gdi32
CreateCompatibleBitmap
SelectObject
DeleteDC
DeleteObject
GetObjectA
CreateCompatibleDC
GetBoundsRect
comdlg32
GetOpenFileNameA
advapi32
ConvertStringSidToSidW
LookupAccountSidW
CreateWellKnownSid
shell32
ord155
SHGetFolderLocation
SHGetFileInfoA
mpr
WNetGetUniversalNameA
msvfw32
MCIWndCreateA
shlwapi
StrStrW
comctl32
ord17
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ