d:\Temp\down\Debug\down.pdb
Static task
static1
Behavioral task
behavioral1
Sample
daf36002d8a151fc229d55e47fc9a12a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
daf36002d8a151fc229d55e47fc9a12a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
daf36002d8a151fc229d55e47fc9a12a_JaffaCakes118
-
Size
326KB
-
MD5
daf36002d8a151fc229d55e47fc9a12a
-
SHA1
c99f724f3ff6068adf9022dcf63a39961c07fb63
-
SHA256
1cf4865eb0601b8644d3e8858b3a2c3ee721c537eb74b106ddb72056c83c5219
-
SHA512
9d99d3f19356b63a20e970aac45c45fbd91a6360adaafc2177fb1ab507413208149b7acd1b25c31b26dc71c0a84aa99db16017d237c04f80308790cf94af3471
-
SSDEEP
6144:eETx9xY+CPpWdwJwl7kXZi3oS9RUuyOyv1lNdTls1N6B5nbBF7:XTx93CBWmJwJW03oaOfPvJly1Y3nb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource daf36002d8a151fc229d55e47fc9a12a_JaffaCakes118
Files
-
daf36002d8a151fc229d55e47fc9a12a_JaffaCakes118.exe windows:5 windows x86 arch:x86
f471b917354244a96ce7fd0915ec78e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WinExec
GetSystemDirectoryA
CompareStringW
CompareStringA
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleW
Sleep
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
HeapValidate
IsBadReadPtr
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
GetProcessHeap
GetModuleFileNameW
VirtualQuery
FreeLibrary
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
InterlockedExchange
InitializeCriticalSectionAndSpinCount
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
GetLocaleInfoA
GetTimeFormatA
GetDateFormatA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetTimeZoneInformation
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
SetEnvironmentVariableA
urlmon
URLDownloadToFileA
Sections
.text Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ