d:\OutMyFile\NewP2P\NewIedll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bdc9ee07b8e2e49b1c61ec7390d2efd5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdc9ee07b8e2e49b1c61ec7390d2efd5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bdc9ee07b8e2e49b1c61ec7390d2efd5_JaffaCakes118
-
Size
188KB
-
MD5
bdc9ee07b8e2e49b1c61ec7390d2efd5
-
SHA1
1b2d45cd300750763e62a7124dcff63cb48d59d1
-
SHA256
7085115bc0a5e733cde1ecdb95f2b437cecfe8e57926d8fc2c8f75aa4bde1b2b
-
SHA512
53b7ff475672f8c2b3c78895b1a89a8a6d1f3f7fca72a4861cf52ccaa030447f23efbe38a7581f7486220c1e19583e281db9880bca940389834891760af5ce64
-
SSDEEP
3072:Z6T3is+EhFwgc/ici0aJi3nglsLQt/7LEmg33/J3OUF5XSfM6qk:Z6euYgVJi3n5LI/7Lj03OUPSfrqk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bdc9ee07b8e2e49b1c61ec7390d2efd5_JaffaCakes118
Files
-
bdc9ee07b8e2e49b1c61ec7390d2efd5_JaffaCakes118.exe windows:5 windows x86 arch:x86
acfa2a158b71deb963a247136c08e1e4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
DeleteFileW
CopyFileW
GetProcAddress
GetModuleHandleW
LoadLibraryW
TerminateProcess
GetCurrentProcess
CreateThread
GetPrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileSectionW
GetFileSize
GetTickCount
Sleep
GetProcessId
LoadLibraryExW
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
OpenEventW
SetEvent
GetFileAttributesW
WinExec
GetComputerNameW
CreateEventW
WaitForSingleObject
SetUnhandledExceptionFilter
GetModuleFileNameW
CreateMutexW
GetLastError
WriteProfileStringW
LoadLibraryA
SetFileAttributesA
SetFileAttributesW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
GetModuleHandleA
VirtualProtectEx
ReadProcessMemory
WriteProcessMemory
FlushInstructionCache
CreateProcessW
lstrlenW
MultiByteToWideChar
VirtualAllocEx
VirtualFreeEx
ReleaseMutex
GetVersionExW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
WriteFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
LCMapStringW
VirtualAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
ReadFile
SetFilePointer
GetSystemDirectoryW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
WritePrivateProfileStringW
CloseHandle
GetPrivateProfileIntA
GetPrivateProfileStringA
DeviceIoControl
CreateFileW
QueryPerformanceCounter
VirtualFree
HeapCreate
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
RaiseException
OutputDebugStringW
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
user32
GetSystemMetrics
wsprintfW
GetWindowThreadProcessId
SetPropW
SetWindowsHookExW
CreateWindowExW
UnhookWindowsHookEx
IsWindow
FindWindowExA
FindWindowW
CallNextHookEx
GetCursorPos
DispatchMessageW
TranslateMessage
GetMessageW
GetClassNameW
GetWindowLongW
WindowFromPoint
PtInRect
SendMessageW
FindWindowExW
MoveWindow
RegisterClassExW
LoadCursorW
GetPropW
DefWindowProcW
ShowWindow
EndPaint
ReleaseDC
GetWindowRect
GetClientRect
GetDC
BeginPaint
advapi32
RegNotifyChangeKeyValue
RegSetValueExW
RegCreateKeyW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegCloseKey
RegSetValueW
RegQueryValueW
shlwapi
StrCmpIW
PathFileExistsW
StrStrIW
ws2_32
gethostname
htonl
WSAStartup
inet_addr
WSACleanup
wininet
InternetOpenW
InternetCloseHandle
InternetOpenUrlW
psapi
GetModuleInformation
dbghelp
MiniDumpWriteDump
gdi32
BitBlt
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ