d:\Works\ByShell_Up33\WinStart\Release\WinStart.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cf4a15f0fa04d4fd29dca011088df4f3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf4a15f0fa04d4fd29dca011088df4f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf4a15f0fa04d4fd29dca011088df4f3_JaffaCakes118
-
Size
198KB
-
MD5
cf4a15f0fa04d4fd29dca011088df4f3
-
SHA1
9b982ead848f31579e808c733a24f68c34a2ea14
-
SHA256
c7b4f51196187244f6e3f33c5a784ef77f81283436b357b2b8a72b4a80b6b46d
-
SHA512
bd0279deaea248f4ddd9d2e2fd56cb96e10282aceb6d6b1c88521f91af1f4bed4993dce128fa086d2c3388561848bdf27d912dc78a6b787908a947e1f57817fb
-
SSDEEP
3072:DseSlV7NFCIPyBH5vgSocto9bkju0jVoloxRxuhdioU9v2w:7+75gZvBoctGkju0PxCviPv2w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf4a15f0fa04d4fd29dca011088df4f3_JaffaCakes118
Files
-
cf4a15f0fa04d4fd29dca011088df4f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
79fbba5920d05e5571dedeafb4139340
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteFile
LockResource
GlobalAlloc
LoadResource
SizeofResource
FindResourceA
ResumeThread
CreateProcessW
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatW
lstrcpyW
GetEnvironmentVariableW
GetShortPathNameW
GetModuleFileNameW
CreateFileA
GetSystemDirectoryA
GlobalFree
HeapAlloc
GetProcessHeap
GetLastError
GetTickCount
CopyFileW
GetSystemDirectoryW
DeleteFileW
ExitProcess
GetProcAddress
LoadLibraryW
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetSystemInfo
VirtualProtect
SetEndOfFile
CreateFileW
CloseHandle
GetFileTime
SetFileTime
Sleep
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
RaiseException
GetLocaleInfoA
GetACP
HeapFree
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
VirtualQuery
ReadFile
TerminateProcess
SetFilePointer
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
LoadLibraryA
SetStdHandle
FlushFileBuffers
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
GetOEMCP
GetCPInfo
user32
RegisterClassExW
CreateWindowExW
ShowWindow
UpdateWindow
DefWindowProcW
advapi32
SetServiceStatus
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
OpenServiceA
StartServiceW
EnumDependentServicesW
OpenServiceW
QueryServiceStatus
ControlService
DeleteService
OpenSCManagerW
CreateServiceW
CloseServiceHandle
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ