g:\Acro_root_vg\Viewer\Win\output\acrobat\AcroRd32Exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dcfc6d81a4e303ca141ed53a1ae39637_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dcfc6d81a4e303ca141ed53a1ae39637_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcfc6d81a4e303ca141ed53a1ae39637_JaffaCakes118
-
Size
216KB
-
MD5
dcfc6d81a4e303ca141ed53a1ae39637
-
SHA1
e896d06d1f17c584e446a00593ffe3b22355dbc0
-
SHA256
7822b39b812beaa3bb6401b1ceda58214a4c45a8f15978e8a589e84ae523d5b6
-
SHA512
eaff777bf2e39670210ccf69f7b5977baab7050abcff8aa466a993a6168e1dd1f1347ce10fbe297d57796bd3859a6460b2c39288aee161dfd7bfce3805002c3b
-
SSDEEP
3072:annbpbukIsSJs/pVJzIxFY4D2ouDWKo0qLp7fvwjDMwjDd:ybbIlYxwFrKouSEq5IjDrjDd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcfc6d81a4e303ca141ed53a1ae39637_JaffaCakes118
Files
-
dcfc6d81a4e303ca141ed53a1ae39637_JaffaCakes118.exe windows:4 windows x86 arch:x86
0152fa618f26ed66fc2cc872ef87f12b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
UnmapViewOfFile
CreateFileA
VirtualQueryEx
GetCurrentProcess
MapViewOfFile
CreateFileMappingA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
ReadFile
CloseHandle
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
LoadLibraryA
FreeLibrary
GetProcAddress
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetSystemInfo
IsDebuggerPresent
OutputDebugStringA
SetFilePointerEx
GetVersionExA
GetStartupInfoA
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
user32
FindWindowA
SendMessageA
MessageBoxA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegQueryValueA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?_Nomemory@std@@YAXXZ
msvcr71
_snprintf
__CxxFrameHandler
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBD@Z
??3@YAXPAX@Z
??1exception@@UAE@XZ
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
_CxxThrowException
??_V@YAXPAX@Z
strchr
free
strrchr
malloc
_callnewh
__security_error_handler
_except_handler3
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ