C:\personnel\range\constrained\dev.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dd692297703a4a32e6ecaedd3d1cfe02_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dd692297703a4a32e6ecaedd3d1cfe02_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd692297703a4a32e6ecaedd3d1cfe02_JaffaCakes118
-
Size
389KB
-
MD5
dd692297703a4a32e6ecaedd3d1cfe02
-
SHA1
9651e6e9109c0825e6b100fc1886c9bdaca43f7f
-
SHA256
b43c1e78747aa686a1d0aca4eb55d01e24b2853c5c0c3e85fd39aac7d347ebac
-
SHA512
f0a745f254262d8b5a32cc9f1b644108cc7948d35827318730831045a3a028694fbb61efb44e5858c9796242fe5eafa01518a5863ccaa59b551507454eff69d4
-
SSDEEP
6144:yYnM4P5pj7lbtV7ejNsXAG5n+z77Ukpl/vqnZhY0K0dBJX+oe16L7quN36QGk:XBPvvJPTvlu77Uvn/Y1KX+oR7quFOk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd692297703a4a32e6ecaedd3d1cfe02_JaffaCakes118
Files
-
dd692297703a4a32e6ecaedd3d1cfe02_JaffaCakes118.exe windows:5 windows x86 arch:x86
ccfa8860a74c1241f15ec3d9e6419974
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStringTypeA
GetLocaleInfoA
HeapSize
IsValidCodePage
GetOEMCP
GetCPInfo
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapReAlloc
VirtualAlloc
VirtualFree
InitializeCriticalSectionAndSpinCount
GetStringTypeW
LeaveCriticalSection
DeleteCriticalSection
GetStdHandle
WriteFile
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
lstrcpyA
GetSystemTime
CloseHandle
GetFileTime
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetLocalTime
GetProcAddress
SetLastError
GetLastError
SetConsoleTitleA
MultiByteToWideChar
GetACP
GetSystemDirectoryA
FileTimeToSystemTime
HeapCreate
Sleep
GetLocaleInfoW
GlobalAlloc
CreateFileA
OpenProcess
GetWindowsDirectoryA
TlsAlloc
TlsGetValue
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleW
GetSystemDefaultLCID
GetUserDefaultLCID
GetCurrentProcess
FindResourceExW
EnterCriticalSection
VirtualQuery
user32
mouse_event
FindWindowA
GetDlgItemTextA
DialogBoxParamA
DestroyIcon
UpdateWindow
SetWindowTextA
GetSystemMetrics
SystemParametersInfoA
MoveWindow
LoadCursorA
EndPaint
DestroyWindow
SetCursor
HideCaret
GetWindowRect
ShowWindow
SendInput
FillRect
GetMessageExtraInfo
SetForegroundWindow
LoadStringA
LoadIconA
DefFrameProcA
wsprintfA
GetClientRect
SetFocus
SendMessageA
BeginPaint
DlgDirListA
WinHelpA
GetDC
GetCursorInfo
SetWindowLongA
InvalidateRect
GetWindowLongA
CreateWindowExA
ReleaseDC
GetDlgItem
EndDialog
GetSysColor
GetCursorPos
InsertMenuItemA
gdi32
GetStockObject
GetObjectA
BitBlt
TranslateCharsetInfo
LineTo
DeleteEnhMetaFile
DeleteDC
CreateFontA
GetDeviceCaps
CreateFontIndirectA
SetBkColor
CreateDCA
UnrealizeObject
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
SetMapMode
CreateCompatibleBitmap
Rectangle
ExtTextOutW
RealizePalette
PlayEnhMetaFileRecord
SelectPalette
SetBoundsRect
UpdateColors
advapi32
RegCloseKey
GetSecurityDescriptorRMControl
RegQueryValueExW
RegOpenKeyExA
GetUserNameA
shell32
SHGetFileInfoA
oleaut32
SystemTimeToVariantTime
RevokeActiveObject
odbc32
ord1
ord11
ord15
ord9
ord2
ord7
ord14
ord16
ws2_32
WSAGetLastError
WSACreateEvent
netapi32
NetShareGetInfo
psapi
GetModuleFileNameExA
EnumProcessModules
GetModuleBaseNameA
msi
ord259
ord261
iphlpapi
CreateProxyArpEntry
DeleteIPAddress
shlwapi
PathAppendA
comctl32
ImageList_ReplaceIcon
ImageList_Create
pdh
PdhBrowseCountersA
rpcrt4
RpcStringBindingComposeA
RpcBindingFree
RpcBindingFromStringBindingA
RpcMgmtSetComTimeout
RpcBindingSetObject
snmpapi
SnmpUtilIdsToA
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 265KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ