d:\temp\builds\8\Binaries\Win32\Release\Reader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dd913424743a5aad598ee60d46e3a1f7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd913424743a5aad598ee60d46e3a1f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd913424743a5aad598ee60d46e3a1f7_JaffaCakes118
-
Size
303KB
-
MD5
dd913424743a5aad598ee60d46e3a1f7
-
SHA1
3d497eb6017aeb6faeee1ce13d14711cbb649e35
-
SHA256
aaa71905f5b9c515f58da3cdf81743b85c6c5c885791afd78ceebd1f22b8900e
-
SHA512
aa577e59c6cc4ef7ad8398d34bb35fc328a04c44debd1534bf4f80089f500fcc8030eed444e5d842aeec37bbd68f14a0e173be64a4df19142a410619e7db1e42
-
SSDEEP
6144:LGch5+jCmeqdMXHp247kbCLg8HX+w5ackbOE09k/UvSrDtwpA2RC47:LDh5UCHXY47kbpmN5aAEgkNDGpbC+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd913424743a5aad598ee60d46e3a1f7_JaffaCakes118
Files
-
dd913424743a5aad598ee60d46e3a1f7_JaffaCakes118.exe windows:5 windows x86 arch:x86
d6a92c1637b528c4b998b2b80f123493
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateMutexA
ReleaseMutex
GetModuleHandleA
CloseHandle
GetModuleFileNameA
OpenMutexA
GetProcAddress
GetLastError
SetCurrentDirectoryA
CreateDirectoryA
ReadFile
GetExitCodeProcess
WriteFile
WaitForSingleObject
GetCurrentProcess
SetFilePointer
GetVersionExA
FormatMessageA
TerminateProcess
FindFirstFileA
RemoveDirectoryA
FindClose
FindNextFileA
GetCurrentProcessId
GetTempPathA
LocalFree
DeleteFileA
ExpandEnvironmentStringsW
GetCPInfo
WideCharToMultiByte
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLocaleInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
HeapFree
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeW
HeapAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
VirtualAlloc
HeapReAlloc
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetStringTypeA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
user32
MessageBoxA
advapi32
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
shell32
ShellExecuteExA
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ