C:\Users\bLAnk_KEn\Desktop\a本学期课程\人机交互技术\工程\Prog3_2\Debug\Prog3_2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d2394146164786c4a2eb990d2adb5cfa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d2394146164786c4a2eb990d2adb5cfa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d2394146164786c4a2eb990d2adb5cfa_JaffaCakes118
-
Size
212KB
-
MD5
d2394146164786c4a2eb990d2adb5cfa
-
SHA1
8404cfd34f3dca37150a8453a98db2e37fc1c03d
-
SHA256
58b337d1950e314e8bed02999fad32c8d292140624ac97fe4199533128f153f1
-
SHA512
cf0d882cae7d056e5aba88114801466d123988758f5633da26af1170a826e7df1c0ff961a9cfe1da84b63b001acdf0f6aee68dadfeafea91a921ab5b39159676
-
SSDEEP
3072:IqFnv0SIQH3RKazbkU1UHkcgLOGF/pstBaDqwONnct437Bl3N2UJH:IpQH3dYjgLOGF/p/uwONct43j92Up
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d2394146164786c4a2eb990d2adb5cfa_JaffaCakes118
Files
-
d2394146164786c4a2eb990d2adb5cfa_JaffaCakes118.exe windows:5 windows x86 arch:x86
6db08ab4b5730a26c3cb7281c18f2f6a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc100ud
ord8218
ord8374
ord11055
ord11052
ord1428
ord16556
ord991
ord7542
ord2695
ord4670
ord10148
ord11148
ord6343
ord13997
ord13167
ord13216
ord11324
ord9053
ord4993
ord13206
ord13198
ord6535
ord4053
ord16155
ord16158
ord16156
ord16159
ord16154
ord16157
ord8765
ord13525
ord15841
ord12908
ord16763
ord2080
ord8712
ord14016
ord4288
ord4347
ord10338
ord15970
ord8691
ord15964
ord13533
ord13532
ord2561
ord5851
ord16444
ord13931
ord9264
ord9358
ord15939
ord15571
ord1036
ord13205
ord12956
ord371
ord1864
ord937
ord9350
ord15191
ord16387
ord8762
ord417
ord7232
ord2599
ord4555
ord10149
ord13071
ord6560
ord14929
ord10175
ord2744
ord4886
ord13122
ord13035
ord2965
ord9045
ord14996
ord6879
ord3339
ord3340
ord3589
ord3590
ord4290
ord11351
ord12309
ord11938
ord9973
ord13078
ord1062
ord1029
ord1064
ord8224
ord7863
ord436
ord10151
ord11149
ord16412
ord15373
ord15094
ord3068
ord9096
ord14955
ord4575
ord6853
ord10017
ord4064
ord11947
ord12191
ord10136
ord13846
ord6108
ord13631
ord16813
ord16729
ord16818
ord16333
ord16562
ord16328
ord16534
ord16550
ord16394
ord10426
ord2910
ord14032
ord13040
ord4333
ord4286
ord15887
ord5876
ord5866
ord11322
ord16730
ord16480
ord16481
ord16460
ord16491
ord16461
ord1079
ord11897
ord9172
ord2606
ord4562
ord4050
ord1434
ord2204
ord2205
ord8370
ord8160
ord1423
ord986
ord10165
ord2872
ord7562
ord10196
ord13168
ord13034
ord9164
ord12200
ord12203
ord10451
ord10466
ord10456
ord10887
ord10892
ord10468
ord12044
ord11388
ord9865
ord9855
ord12665
ord12048
ord9945
ord12069
ord10953
ord10954
ord13070
ord1028
ord1059
ord1348
ord13484
ord14162
ord3786
ord873
ord14160
ord356
ord14159
ord3461
ord406
ord3460
ord351
ord5625
ord2694
ord4669
ord9064
ord10049
ord8891
ord7553
ord11567
ord9227
ord11609
ord11720
ord12597
ord12111
ord12115
ord15367
ord292
ord1003
ord2613
ord13049
ord10242
ord14815
ord1401
ord1449
ord11293
ord12408
ord4991
ord4043
ord5867
ord12714
ord12719
ord10293
ord9767
ord6586
ord12344
ord6563
ord14934
ord6564
ord14936
ord1788
ord13450
ord6759
ord5399
ord5398
ord9281
ord3351
ord6881
ord15000
ord3480
ord3477
ord9044
ord2966
ord16747
ord16749
ord16748
ord16746
ord16750
ord16732
ord16659
ord16660
ord10077
ord13027
ord4037
ord12863
ord15963
ord9904
ord13126
ord4885
ord2743
ord4270
ord7719
ord11924
ord10177
ord3440
ord15144
ord13223
ord13221
ord1759
ord1766
ord1772
ord1770
ord1777
ord5341
ord5378
ord5349
ord5361
ord5357
ord5353
ord5383
ord5374
ord5345
ord5387
ord5366
ord5332
ord5336
ord5369
ord4897
ord16667
ord4884
ord3241
ord15965
ord8692
ord15971
ord7563
ord12638
ord14926
ord6559
ord2873
ord4142
ord3553
ord3552
ord3439
ord13117
ord5692
ord6079
ord6340
ord10291
ord6049
ord6368
ord5695
ord5914
ord5672
ord8467
ord8468
ord8458
ord5912
ord9057
ord11153
ord10152
ord14235
ord470
ord958
ord1104
ord1441
ord7879
ord1451
ord8228
ord6142
ord1442
ord2480
ord2300
msvcr100d
_XcptFilter
_cexit
exit
_exit
__wgetmainargs
_amsg_exit
_snprintf_s
_errno
_CrtDbgReport
free
strcpy
__CxxFrameHandler3
wcscpy
_vsnprintf_s
memset
_vsnwprintf_s
_snwprintf_s
wcscpy_s
wcsncpy_s
strcpy_s
calloc
_recalloc
memcmp
_wcsicmp
memmove_s
wcslen
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
??_V@YAXPAX@Z
sqrt
fabs
_purecall
_CxxThrowException
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
_invoke_watson
_controlfp_s
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
_CRT_RTC_INITW
_initterm_e
_initterm
_CrtDbgReportW
_CrtSetCheckCount
_wcmdln
kernel32
UnhandledExceptionFilter
InterlockedDecrement
EncodePointer
InterlockedExchange
Sleep
InterlockedCompareExchange
HeapSetInformation
GetStartupInfoW
DecodePointer
WideCharToMultiByte
OpenFileMappingA
GetCurrentThread
CreateFileMappingA
MapViewOfFile
GetSystemInfo
UnmapViewOfFile
VirtualAlloc
MulDiv
GetLastError
OutputDebugStringW
OutputDebugStringA
OpenEventA
SetEvent
CloseHandle
IsDebuggerPresent
MultiByteToWideChar
RaiseException
lstrlenA
GetProcAddress
LoadLibraryW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapFree
HeapAlloc
InterlockedIncrement
GetProcessHeap
GetModuleFileNameW
VirtualQuery
FreeLibrary
user32
LoadCursorW
SetCursor
SetClassLongW
CopyRect
IsRectEmpty
PtInRect
SetRect
SetRectEmpty
EqualRect
InflateRect
OffsetRect
IntersectRect
SubtractRect
UnionRect
oleaut32
SysFreeString
advapi32
RevertToSelf
SetThreadToken
OpenThreadToken
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ