e:\Burn\send\house\ExampleClass.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d92b779ad3e8dfd26705cc812596ea17_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d92b779ad3e8dfd26705cc812596ea17_JaffaCakes118
-
Size
463KB
-
MD5
d92b779ad3e8dfd26705cc812596ea17
-
SHA1
b89c23e04dd75ae20f8ec0b231b8b3030e6a1630
-
SHA256
08496cc999257f967a0174a1e24876753ca8ef069eba9a0480755389b6acce89
-
SHA512
c6e372ec6ea933736aa5886f512b0d41621ee4f74c146e859bc9c03769009473b2b9e6f9e8a2f750783eb3bab2b0104735619e38e079ae541799f7dbebd29797
-
SSDEEP
6144:mbY3diKh7LZS2hYRVnDfdwzKrPlWDW4krAEY+VCil5t5pZNBNubdIoSRDENgetat:mMd/fiRT1rUDWFYm5zNBNubLpx8wNu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d92b779ad3e8dfd26705cc812596ea17_JaffaCakes118
Files
-
d92b779ad3e8dfd26705cc812596ea17_JaffaCakes118.exe windows:6 windows x86 arch:x86
06a93c81f67b4a35e5ab175a371fb8b8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadConsoleW
CreateFileW
SetStdHandle
WriteConsoleW
FindFirstFileExA
FindClose
GetCommandLineW
HeapSize
SetEndOfFile
Sleep
GetCurrentDirectoryA
FindNextFileA
VirtualProtect
GetCommandLineA
EncodePointer
DecodePointer
RaiseException
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
CloseHandle
DuplicateHandle
WaitForSingleObjectEx
GetCurrentProcess
GetCurrentThread
GetExitCodeThread
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
CreateTimerQueue
GetLastError
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RtlUnwind
HeapAlloc
HeapFree
ExitThread
GetModuleHandleExW
HeapReAlloc
ExitProcess
GetStdHandle
WriteFile
GetModuleFileNameA
GetACP
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
ReadFile
GetProcessHeap
FlushFileBuffers
SetFilePointerEx
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
user32
DrawFrameControl
PostMessageA
FillRect
TrackPopupMenu
GetActiveWindow
IsDialogMessageA
ClientToScreen
SetWindowsHookExA
FrameRect
SystemParametersInfoA
AppendMenuA
GetWindowTextLengthA
RegisterClassExA
gdi32
Escape
TextOutA
advapi32
RegCloseKey
RegQueryValueExA
RegCreateKeyA
SystemFunction036
sfc
SfcGetNextProtectedFile
Sections
.text Size: 345KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ