d:\my_wa\perftools\OD5\ATIODCLI\build\2k\B_rel\ATIODCLI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d27f3b25125411b6cc7482a350cbdbbf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d27f3b25125411b6cc7482a350cbdbbf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d27f3b25125411b6cc7482a350cbdbbf_JaffaCakes118
-
Size
44KB
-
MD5
d27f3b25125411b6cc7482a350cbdbbf
-
SHA1
c8a269af6bf16ff4b49e1b609ee86f1fd55ff86e
-
SHA256
926bc2174b5eee985fd1a682101ac656b61fa8e9fa073a79d8f6e322a1339f25
-
SHA512
03de9feb82864b852a6d40c8c36f1d757718411809c345096b5f7fa2967bb455633780cf34633970ecd2a1437f3889e5ad96e83b2646a4230aa650293302998e
-
SSDEEP
768:TxV0lrTUoZ9vTRn+m9kTSeBTnh/IfnBM8/:TYl8o9vTg6kTSAnhAvB1/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d27f3b25125411b6cc7482a350cbdbbf_JaffaCakes118
Files
-
d27f3b25125411b6cc7482a350cbdbbf_JaffaCakes118.exe windows:4 windows x86 arch:x86
4def1bee8eb5a0c308252f928a1140cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MapViewOfFile
Sleep
OpenFileMappingA
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetProcAddress
GetModuleHandleA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
TlsAlloc
SetLastError
GetCurrentThreadId
GetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
WriteFile
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetCPInfo
GetLocaleInfoA
GetACP
GetOEMCP
RtlUnwind
InterlockedExchange
VirtualQuery
InitializeCriticalSection
HeapReAlloc
VirtualAlloc
FlushFileBuffers
LoadLibraryA
VirtualProtect
GetSystemInfo
LCMapStringA
LCMapStringW
SetFilePointer
CloseHandle
SetStdHandle
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ