c:\Documents and Settings\Igor\Рабочий стол\Codec(WIN32_LEAN_AND_MEAN)\Release\Codec.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e2841cea2e7e5aedcfacd8516611ecc1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2841cea2e7e5aedcfacd8516611ecc1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e2841cea2e7e5aedcfacd8516611ecc1_JaffaCakes118
-
Size
84KB
-
MD5
e2841cea2e7e5aedcfacd8516611ecc1
-
SHA1
a68fe20a56bc7d92e1268b241aff14330bd5ed4d
-
SHA256
1a70c398172d570032de29905aeec5b16f2e53aae5f4324e69166732deda4f7a
-
SHA512
325aca0769e5a089a0fde09ae7469a94726d73f28aaa7eda99414fadd7b5c50eb5c1468f3cf16769ca831c1afba69b67291580fbf1bd3eaae0694b83c9416160
-
SSDEEP
1536:910qp8kWGnhseRl6984T+5MOaBEpdJlqHLQmUJS8C0VPI0ZL:91tp8u5MZCzqHLQPJS87Vg0ZL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2841cea2e7e5aedcfacd8516611ecc1_JaffaCakes118
Files
-
e2841cea2e7e5aedcfacd8516611ecc1_JaffaCakes118.exe windows:4 windows x86 arch:x86
e5713bc8680d5c08efe20b17c54e3af8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WinExec
DeleteFileA
GetCurrentDirectoryA
HeapSize
VirtualQuery
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
GetShortPathNameA
GetLocaleInfoA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetCPInfo
GetOEMCP
GetACP
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
lstrcpyA
lstrcatA
GetModuleFileNameA
GetEnvironmentVariableA
GetLogicalDriveStringsA
GetDriveTypeA
CreateFileA
DeviceIoControl
CloseHandle
LoadLibraryA
IsBadWritePtr
HeapReAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
GetLastError
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
WriteFile
ReadFile
HeapFree
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TlsFree
SetLastError
TlsSetValue
TlsGetValue
TlsAlloc
GetProcAddress
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
FlushFileBuffers
SetStdHandle
SetEndOfFile
VirtualAlloc
user32
LoadIconA
LoadCursorA
RegisterClassExA
GetSystemMetrics
CreateWindowExA
SetTimer
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
GetWindowDC
FillRect
ReleaseDC
GetAsyncKeyState
PostQuitMessage
RegisterHotKey
FindWindowA
ShowWindow
SetWindowPos
GetWindowTextA
UnregisterHotKey
SendMessageA
SetWindowTextA
DefWindowProcA
MessageBoxA
GetClientRect
gdi32
SetTextColor
GetStockObject
SetBkMode
advapi32
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
shell32
ShellExecuteA
SHFileOperationA
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ