f:\Programmieren\Codesoft Releases\Absinth_Crypter v3.5 (Sale Version)\BoddAH Version\stub\Release\stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
beb34f73cf01dc2caeb006bd0f1ac97f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
beb34f73cf01dc2caeb006bd0f1ac97f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
beb34f73cf01dc2caeb006bd0f1ac97f_JaffaCakes118
-
Size
168KB
-
MD5
beb34f73cf01dc2caeb006bd0f1ac97f
-
SHA1
f15f6f4193be8ae98da013dea20f2ae25ab51d91
-
SHA256
c81e74713b466f1ea9bf083abff2b3ad223c680229e23fa73acd9ba0d749850b
-
SHA512
95bfde6637c38bc1094f3b6c13bbba1ddb2e764e8fb3e98586d0e4733d5b074dc4b9cd23401009060f82fbdf4caef71ccb1d899b4e396c03dd7017cad592728e
-
SSDEEP
3072:dq0VehzStHWjFnYB1WWDbTBVslWhygB03KN1f:c0VexyunYB5T74g2KNN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource beb34f73cf01dc2caeb006bd0f1ac97f_JaffaCakes118
Files
-
beb34f73cf01dc2caeb006bd0f1ac97f_JaffaCakes118.exe windows:4 windows x86 arch:x86
fef9e1d9e7465deb017251c9a3fba3c8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringA
GetProcAddress
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
IsBadWritePtr
IsBadReadPtr
HeapValidate
RaiseException
DebugBreak
GetStdHandle
WriteFile
LoadLibraryA
GetModuleFileNameA
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
HeapAlloc
HeapReAlloc
VirtualAlloc
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
GetCPInfo
VirtualQuery
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
IsBadCodePtr
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
SetFilePointer
SetStdHandle
FlushFileBuffers
CloseHandle
ReadFile
CreateFileA
ResumeThread
SetThreadContext
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
GetThreadContext
CreateProcessA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
SetEndOfFile
mscoree
_CorExeMain
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ