X:\Dev_CPP\Work\VS_KnzStr_Adware\Release\VS_Work5.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d12788694bf274b5d8d0b78bde00e075_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d12788694bf274b5d8d0b78bde00e075_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d12788694bf274b5d8d0b78bde00e075_JaffaCakes118
-
Size
80KB
-
MD5
d12788694bf274b5d8d0b78bde00e075
-
SHA1
c15a2fa861985799787e348a8e3c8230a7ec4ba9
-
SHA256
a4dbc00144ba72c304b74d6f9e016ac4ca2b8146c8f33fa1754c1333ad58e95e
-
SHA512
eb93be3a1627c827064ac1d93641c409cda7055662d0f58d7add5198c5310c293cbc8fe49328dce8f6db1fe606f6c837f9843621608127c060c1ade579c82386
-
SSDEEP
1536:zL7UmYmwgjGHgtWGddgLk/ULJwEwX9CP5GnWBDC:zPUm36AjcwX9m5GMDC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d12788694bf274b5d8d0b78bde00e075_JaffaCakes118
Files
-
d12788694bf274b5d8d0b78bde00e075_JaffaCakes118.exe windows:5 windows x86 arch:x86
b8fba71b7bae2bc26e3d0ae34ed93608
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineA
WinExec
ExitProcess
Sleep
SwitchToThread
CreateMutexA
GetLastError
CreateThread
TerminateThread
CloseHandle
ExpandEnvironmentStringsA
CreateProcessA
TerminateProcess
GetFileAttributesA
lstrcmpA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SetEndOfFile
LoadLibraryA
lstrcatA
lstrcpyA
GetModuleFileNameA
lstrlenA
GetLocaleInfoA
GetStartupInfoA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RaiseException
HeapFree
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
VirtualAlloc
HeapReAlloc
CreateFileA
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
MultiByteToWideChar
ReadFile
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
AppendMenuA
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DefWindowProcA
PostQuitMessage
CharUpperA
CreatePopupMenu
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
Shell_NotifyIconA
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ