c:\Documents and Settings\otro\Escritorio\megatraza\traza\Debug\traza.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c91b07fcf9d9e186e4eb3a8565d3f1b5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c91b07fcf9d9e186e4eb3a8565d3f1b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c91b07fcf9d9e186e4eb3a8565d3f1b5_JaffaCakes118
-
Size
168KB
-
MD5
c91b07fcf9d9e186e4eb3a8565d3f1b5
-
SHA1
b33f3f5e12087c1e7059c531774e226b3afb6306
-
SHA256
a718afe5da54ccacf8d0924856a141df4c40bca9eb7b9384e04a70ebc86e06ca
-
SHA512
5da962e6dd153cd0567d7291a716751f0455291b63f5a3bc930ae6c706f3d38289cbb24412905629cef67f5e487bbfe5628da4e014e2c9f19d7e01e6a3187315
-
SSDEEP
3072:eai+jqS500t/rfWWGFpyQh/+480pKIF3AoKxl:GSC0dkFpyQpHpKY3LK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c91b07fcf9d9e186e4eb3a8565d3f1b5_JaffaCakes118
Files
-
c91b07fcf9d9e186e4eb3a8565d3f1b5_JaffaCakes118.exe windows:4 windows x86 arch:x86
1d9fd3674f6ec5ac2d0eae4807e168ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
WaitForSingleObject
CreateProcessA
lstrlenA
WideCharToMultiByte
GetProcAddress
LoadLibraryA
GetModuleHandleA
WriteFile
lstrcpyA
GetFileAttributesA
CreateFileA
lstrcatA
GetTempPathA
GetSystemDirectoryA
GetLastError
CreateMutexA
CopyFileA
DeleteFileA
SetFileAttributesA
GetModuleFileNameA
SystemTimeToFileTime
GetSystemTimeAsFileTime
Sleep
ExitThread
CreateThread
ExitProcess
HeapAlloc
GetProcessHeap
lstrcmpiA
GetTickCount
lstrcpynA
GlobalFree
HeapFree
InterlockedDecrement
InterlockedIncrement
GlobalAlloc
GetFileSize
GetTempFileNameA
ReadFile
GetEnvironmentVariableA
GetWindowsDirectoryA
FindClose
FindNextFileA
FindFirstFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetDriveTypeA
SetThreadPriority
GetCurrentThread
SetFilePointer
GetSystemTime
SetStdHandle
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
HeapReAlloc
GetOEMCP
GetTimeZoneInformation
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcmpA
GetACP
InterlockedExchange
SetConsoleCtrlHandler
GetCPInfo
GetLocaleInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapValidate
IsBadReadPtr
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
DebugBreak
RaiseException
GetVersionExA
GetCommandLineA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStdHandle
OutputDebugStringA
GetStringTypeA
GetStringTypeW
GetCurrentProcess
FreeLibrary
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
FlushFileBuffers
user32
wvsprintfA
CharUpperA
CharUpperBuffA
CharLowerA
wsprintfA
advapi32
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
ws2_32
connect
WSAGetLastError
select
__WSAFDIsSet
ioctlsocket
closesocket
gethostbyname
htons
WSAStartup
socket
ntohs
recv
sendto
inet_addr
send
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE