D:\FirstBot\OctoberCode\CodeOne\HeaderOct_xls\Release\HeaderOct.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d48f0d31b1b3cb61bf3e1b9dfb4d728b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d48f0d31b1b3cb61bf3e1b9dfb4d728b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d48f0d31b1b3cb61bf3e1b9dfb4d728b_JaffaCakes118
-
Size
23.6MB
-
MD5
d48f0d31b1b3cb61bf3e1b9dfb4d728b
-
SHA1
43f91b88a79328c98bd21d4379a8be974b6ecee7
-
SHA256
157795d94bb84c907c52d8a19b0df218520f4c3a9d13a455ec981342e1049217
-
SHA512
3d33f3c396cab627131e9f1ad20f2d923be20282a672c435ad016643c5313e2236ea0deee7ae634136a510d3934b359c079a738a21d1bf355a338bdb35485dc2
-
SSDEEP
6144:DUtjKmiEf1OWM1m86AwDEuyaIvgQwp6nrVc/QhzJlyaIvgQwp6nrVc/QhzJ/NNU:wtjcELJAwD6aIPkaIP/U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d48f0d31b1b3cb61bf3e1b9dfb4d728b_JaffaCakes118
Files
-
d48f0d31b1b3cb61bf3e1b9dfb4d728b_JaffaCakes118.exe windows:5 windows x86 arch:x86
91ea8b24f6c88e03846b4320b8eb842c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcpynA
lstrcatA
ExitProcess
GetSystemDirectoryA
GetCurrentThreadId
CreateThread
lstrcpyA
CreateDirectoryA
SetFileAttributesA
CopyFileA
GetCurrentProcess
SetFilePointer
WriteFile
lstrcmpiA
GetTickCount
DeleteFileA
GetLastError
GlobalAlloc
MoveFileW
FreeLibrary
GetProcessHeap
SetEndOfFile
WriteConsoleW
HeapReAlloc
FlushFileBuffers
IsProcessorFeaturePresent
SetStdHandle
GetStringTypeW
GetConsoleMode
GetConsoleCP
HeapSize
LoadLibraryW
GetModuleFileNameW
lstrlenA
MultiByteToWideChar
GetModuleFileNameA
CloseHandle
CreateFileA
GetTempPathA
Sleep
GlobalFree
WideCharToMultiByte
HeapAlloc
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleW
DecodePointer
GetStdHandle
HeapCreate
EncodePointer
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
ReadFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
CreateFileW
user32
DefWindowProcA
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
GetMessageA
PostThreadMessageA
ShowWindow
SendMessageA
LoadIconA
advapi32
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptReleaseContext
CryptAcquireContextA
AdjustTokenPrivileges
OpenProcessToken
shell32
SHCreateDirectoryExA
ShellExecuteExW
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23.5MB - Virtual size: 23.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ