Z:\我的工作\mysoft\代码\test\testprocess\Rlease_file\testprocess.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c87baaf2e0cdb3e23dc2ddd53dcf80ec_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c87baaf2e0cdb3e23dc2ddd53dcf80ec_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c87baaf2e0cdb3e23dc2ddd53dcf80ec_JaffaCakes118
-
Size
469KB
-
MD5
c87baaf2e0cdb3e23dc2ddd53dcf80ec
-
SHA1
70783b4ed3bbf4a536aeef010ed5c900fb94c1e7
-
SHA256
1bbf2a987a423ce9d207d04ca3fc03d35e2b390ce3f1e79ec2b6967c82225404
-
SHA512
e564b2d991c51553fb0de5f556fbc7bf49af1d9e59e456bbdd5edc6d560f799fe6c6734551873f2acc4d9e17249134ba2a780458184abe537e4fab40606de409
-
SSDEEP
6144:LzKMh+9G0ElVFSxGPFOX0O/yYTqP27V0pAH4KBoDUE/jNicTh8Xhd05BRl9tIOiy:/KMhPlS+Fo9TZiZwLhQBP9tsYYdBHX8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c87baaf2e0cdb3e23dc2ddd53dcf80ec_JaffaCakes118
Files
-
c87baaf2e0cdb3e23dc2ddd53dcf80ec_JaffaCakes118.exe windows:6 windows x86 arch:x86
0d113a91b90c40c5855e7c492b4d8f96
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualAlloc
VirtualAllocEx
VirtualFree
FindResourceA
LoadResource
LockResource
SizeofResource
OutputDebugStringA
FindFirstFileA
FindNextFileA
GetCurrentProcess
SetThreadPriority
GetCurrentThread
ExitProcess
CloseHandle
SetUnhandledExceptionFilter
GetModuleHandleA
Sleep
CreateFileW
WriteConsoleW
GetLastError
SetPriorityClass
CreateProcessA
SetStdHandle
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStringTypeW
LCMapStringW
HeapReAlloc
LoadLibraryW
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
InterlockedDecrement
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetCommandLineA
HeapFree
IsDebuggerPresent
IsProcessorFeaturePresent
HeapAlloc
RaiseException
SetLastError
InterlockedIncrement
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
UnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetStdHandle
WriteFile
GetModuleFileNameW
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapSize
GetProcessHeap
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
OutputDebugStringW
user32
wsprintfA
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shell32
SHChangeNotify
ShellExecuteA
ntdll
NtGetContextThread
NtReadVirtualMemory
NtTerminateProcess
NtUnmapViewOfSection
NtWriteVirtualMemory
NtSetContextThread
NtResumeThread
RtlUnwind
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ