D:\DEV\Meridian4\Autoplay_Murder\Release\Autoplay.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eb6b4454f1b02991862c7e916bb77a82_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eb6b4454f1b02991862c7e916bb77a82_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb6b4454f1b02991862c7e916bb77a82_JaffaCakes118
-
Size
794KB
-
MD5
eb6b4454f1b02991862c7e916bb77a82
-
SHA1
fc5fce75bf325d8dd9fabb752b75f80fba82a043
-
SHA256
9fbacc9266a37258a52c63e3a79de0de52b5fa985d0d5136a449abefc3ccaa83
-
SHA512
477ea4dee7a80784a424a866f7e6f1829ad2e764177f7da709b646f4accaba15d4d427bbf0e19c635fa6a581843a0d084c9a206be2dc264af1b6e5d35513b52e
-
SSDEEP
6144:eMpV2koxyswsX4Eavo2ANmwgBSO9Cml+d0EtLPLt8E/ijC+I9okhj33T:eTwmewgS5d0Ed+O9okZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb6b4454f1b02991862c7e916bb77a82_JaffaCakes118
Files
-
eb6b4454f1b02991862c7e916bb77a82_JaffaCakes118.exe windows:5 windows x86 arch:x86
da7b7c36b83b7ff26b36e898af56e985
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
QueryPerformanceCounter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetModuleFileNameA
user32
EndPaint
DestroyWindow
SetCursor
GetMessageA
PostQuitMessage
LoadIconA
BeginPaint
TranslateMessage
ShowCursor
CreateWindowExA
DefWindowProcA
DispatchMessageA
GetSystemMetrics
LoadImageA
LoadCursorA
RegisterClassA
GetDC
gdi32
CreateCompatibleDC
DeleteObject
GetDIBits
DeleteDC
BitBlt
SelectObject
shell32
ShellExecuteA
msvcr90
_invoke_watson
_controlfp_s
_except_handler4_common
_decode_pointer
_onexit
_lock
strcpy_s
??3@YAXPAX@Z
strcat_s
??2@YAPAXI@Z
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
memset
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 783KB - Virtual size: 783KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ