E:\r\ws\St_Make\code\build\win\results\Release\info\CaptiveAppEntry.pdb
Static task
static1
Behavioral task
behavioral1
Sample
de64866fc63a039d247b1db0110acb80_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de64866fc63a039d247b1db0110acb80_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
de64866fc63a039d247b1db0110acb80_JaffaCakes118
-
Size
147KB
-
MD5
de64866fc63a039d247b1db0110acb80
-
SHA1
b64f3e1522cc4500d41422947e7a7a5862ca986b
-
SHA256
75dde34b50ebbb5804091c32e64da7589c764a4fa0de987f8add465da592492e
-
SHA512
36ebfdf299f7a97243ba675183d190e857d50903a2895854c4716824d36eec43723f2d5117a67274cf43e6e74f3d423a4034663de983acdbcfe50aaadfe9e650
-
SSDEEP
1536:YBeYPEuHl4zW5pLKBJwLcDxbid/aSdWHUyB+pyw17Nl57OGnWIPi/w:GlsW5pLKBPDxed/kw17nFvnWx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de64866fc63a039d247b1db0110acb80_JaffaCakes118
Files
-
de64866fc63a039d247b1db0110acb80_JaffaCakes118.exe windows:5 windows x86 arch:x86
9b8cde1048803eb9f29e20b92535d1cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetStdHandle
ExitProcess
CreateFileW
GetModuleHandleW
WriteConsoleW
GetStdHandle
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetUserDefaultUILanguage
GetCommandLineW
HeapAlloc
GetProcessHeap
GetFullPathNameW
HeapFree
GetCommandLineA
GetStartupInfoA
SetUnhandledExceptionFilter
Sleep
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
GetFileAttributesW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
CloseHandle
InitializeCriticalSection
SetFilePointer
LoadLibraryW
GetProcAddress
VirtualFree
GetModuleFileNameW
CreateFileA
shell32
CommandLineToArgvW
user32
MessageBoxExW
shlwapi
PathAppendW
PathRemoveFileSpecW
StrCmpW
msi
ord90
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
cacrgw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 84KB - Virtual size: 84KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE