C:\Users\DODO\Videos\TwoStageSearch\TwoStageSearch\TwoStageSearch\Release\TwoStageSearch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ddcd5ace4dbc5a6dbd9dccc0c6a7b68b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ddcd5ace4dbc5a6dbd9dccc0c6a7b68b_JaffaCakes118
-
Size
667KB
-
MD5
ddcd5ace4dbc5a6dbd9dccc0c6a7b68b
-
SHA1
bd7f51d3d723e0353622bfc7e4dc6e940d22505e
-
SHA256
aba37fb005ced0c62458d6128fb6600a06cc322d706e179815a52817b2be1750
-
SHA512
07c77e3cf30479f3a7f64592ade323c963ba1d7826e9b480fad1866003452c1b31f2a0783a7358c8c84238aea32bde3c519259cbc98f8d5837c1c7cc60f907f5
-
SSDEEP
12288:76JJG//tnC5VCFSoDpaQlHfl6mCiWDaBMNCrbnG:76J6/tniVNoDgQVN6mCip9rbG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ddcd5ace4dbc5a6dbd9dccc0c6a7b68b_JaffaCakes118
Files
-
ddcd5ace4dbc5a6dbd9dccc0c6a7b68b_JaffaCakes118.exe windows:6 windows x86 arch:x86
beb5959bb1e83e2e3f4789da7e63bdcd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetExitCodeProcess
ReadFile
CreateFileW
GetTempPathW
GetFileSizeEx
GetLastError
GetCurrentDirectoryW
GetProcAddress
VirtualAlloc
FindClose
SetCurrentDirectoryW
FindNextFileW
CloseHandle
DeleteFileW
FlushFileBuffers
GetFullPathNameA
WriteConsoleW
CreateProcessW
WaitForSingleObject
ReadConsoleW
SetEndOfFile
GetTimeZoneInformation
SetStdHandle
RtlUnwind
HeapReAlloc
OutputDebugStringW
LoadLibraryExW
FreeLibrary
SetConsoleCtrlHandler
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LoadLibraryW
GetStringTypeW
SetEnvironmentVariableW
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
RaiseException
GetFileAttributesExW
CreateSemaphoreW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetFullPathNameW
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
HeapSize
GetModuleFileNameW
WriteFile
GetStdHandle
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
GetCurrentThreadId
GetModuleHandleW
GetLocaleInfoW
FindFirstFileExW
GetLogicalDriveStringsW
GetEnvironmentVariableW
GetCurrentThread
SetLastError
GetCPInfo
GetOEMCP
SetFilePointer
FindFirstFileW
CreateFileA
GetTempFileNameW
FatalAppExitA
GetACP
IsValidCodePage
GetCommandLineW
HeapFree
HeapAlloc
EncodePointer
DecodePointer
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
IsDebuggerPresent
IsProcessorFeaturePresent
SetEnvironmentVariableA
user32
EndPaint
ClientToScreen
DestroyWindow
GetWindowTextLengthW
TranslateAcceleratorW
ScreenToClient
GetWindowRect
SetActiveWindow
GetMessageW
SendInput
PostQuitMessage
SetKeyboardState
GetKeyState
GetSubMenu
GetFocus
DialogBoxParamW
GetParent
LoadCursorW
GetClipCursor
FindWindowW
GetClientRect
SetFocus
BeginPaint
wsprintfW
TranslateMessage
LoadAcceleratorsW
GetKeyboardState
GetMenu
RegisterClassExW
OffsetRect
GetAsyncKeyState
MessageBoxA
SetCursorPos
LoadMenuW
GetAncestor
GetWindowTextW
PeekMessageW
GetDlgItem
EndDialog
GetDesktopWindow
GetCursorPos
LoadStringW
EnumChildWindows
ShowWindow
SetMenu
GetSysColorBrush
LoadBitmapW
CreateDialogParamW
FindWindowExW
ClipCursor
CreateWindowExW
SetMenuDefaultItem
MessageBoxW
GetComboBoxInfo
GetSystemMetrics
IsWindowVisible
SendMessageW
UpdateWindow
GetDlgCtrlID
SetWindowTextW
DefWindowProcW
CopyRect
GetWindow
MoveWindow
DispatchMessageW
LoadIconW
gdi32
CreateFontW
DeleteObject
advapi32
CryptAcquireContextA
shell32
ShellExecuteW
SHOpenWithDialog
ShellExecuteExW
comctl32
ord413
ImageList_Add
ImageList_Create
ord410
shlwapi
ord191
PathMatchSpecW
Exports
Exports
T5676thdrgddhf
Sections
.text Size: 385KB - Virtual size: 384KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ