c:\Users\Mark\Desktop\Loader Source Code\Debug\GDL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
de8bd8268ab7b300221bade804efaf90_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de8bd8268ab7b300221bade804efaf90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de8bd8268ab7b300221bade804efaf90_JaffaCakes118
-
Size
556KB
-
MD5
de8bd8268ab7b300221bade804efaf90
-
SHA1
66d271df2e75edef3ba23a3b1ffc72e62318bd26
-
SHA256
4201792a39627f2847ed806749527196de08809dc985dcd39316159cee77e7a9
-
SHA512
f89ea386fa99dc8ed7ad338edf4d16bc7e14dad3059d7adc6e1786c5b6fa59819cc9805093160943698c2f80ee1b31fe6094ee8a12f1bc8a6acb6ed2805b7ae8
-
SSDEEP
12288:xwUb58yv37m6pjfmjX5hYAcg7U2mgSJO5e/9/:xwU9JLm6JAhYM7hmgSJn/9/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de8bd8268ab7b300221bade804efaf90_JaffaCakes118
Files
-
de8bd8268ab7b300221bade804efaf90_JaffaCakes118.exe windows:5 windows x86 arch:x86
1c45289d3723cf9dc1da4be721be5b39
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
timeGetTime
kernel32
Sleep
CreateThread
CloseHandle
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
WriteProcessMemory
VirtualAllocEx
OpenProcess
lstrlenW
lstrlenA
GetCurrentProcess
ExitProcess
GetModuleHandleA
CreateMutexA
CompareStringA
GetTimeZoneInformation
ReadFile
SetEndOfFile
SetFilePointer
GetConsoleOutputCP
WriteConsoleA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetDateFormatA
GetTimeFormatA
GetLocaleInfoA
GetModuleFileNameA
CompareStringW
GetLastError
TlsFree
GetLocaleInfoW
GetStringTypeW
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
GetCommandLineA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
HeapValidate
IsBadReadPtr
RtlUnwind
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
SetEnvironmentVariableA
SetLastError
GetCurrentThread
WriteFile
GetStdHandle
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
DeleteCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
CreateFileA
GetProcessHeap
VirtualQuery
LCMapStringA
LCMapStringW
GetStringTypeA
user32
CreateDialogParamA
ShowWindow
UpdateWindow
LoadCursorA
GetMessageA
TranslateMessage
DispatchMessageA
SetCursor
SetDlgItemTextA
wsprintfW
FindWindowA
GetWindowThreadProcessId
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
shell32
ShellExecuteA
Sections
.textbss Size: - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 374KB - Virtual size: 373KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ