C:\Users\Kyle\Desktop\TempTest\2005\Output\Release\s74lupm2770uyv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cec5bc10e7822f28383dcfdb7e1ecbc0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
cec5bc10e7822f28383dcfdb7e1ecbc0_JaffaCakes118
-
Size
198KB
-
MD5
cec5bc10e7822f28383dcfdb7e1ecbc0
-
SHA1
2af58758c3f057b535554007fe246ab1323c960a
-
SHA256
32ea0402655da5f8156d25074db53fa3ceda9af562b859a991fea374a07af58c
-
SHA512
9b9082cea702d66d6b3acb87506dd4eedb03c201a0dda1238245fcd06e384e4030598c4e291cf9044642fdf007b3a181b0a19e4dd6dc2526c5d2e837bacf6e69
-
SSDEEP
6144:FXZVyXAcvTXdDNLLCnadRzP0N3cYehIHtny:1SAcvTOaXSZehIHM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cec5bc10e7822f28383dcfdb7e1ecbc0_JaffaCakes118
Files
-
cec5bc10e7822f28383dcfdb7e1ecbc0_JaffaCakes118.exe windows:4 windows x86 arch:x86
03f4ac5c7a42d0cfe61b7279e121cebc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
msvcr80
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
_adjust_fdiv
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
atoi
?terminate@@YAXXZ
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ