c:\Program Files\Microsoft Visual Studio\MyProjects\Nick Skrepetos Projects\BootSafe\Release\BootSafe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ef10e8553a93bd9425650d86cda5054d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef10e8553a93bd9425650d86cda5054d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef10e8553a93bd9425650d86cda5054d_JaffaCakes118
-
Size
187KB
-
MD5
ef10e8553a93bd9425650d86cda5054d
-
SHA1
c2124a139d216b817c89df855133947834f8018e
-
SHA256
40059443200d209d166c1064cae3f806468152056dfc05cecbd1c7e64f7441fc
-
SHA512
95e47a9bba2f5dbd3c627fe102901e67f46091188ade93c3baa02b213d0e938d04cec5345174dbeb744c960716a8f3d56f472158827b95f67dbd3ea5bcaa3463
-
SSDEEP
3072:mbNQL/QrD/NwwPYjn6WcV2AjYywF5kviI9gpIL5s2Cnb:KQmN9w6WtAS3IL5o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef10e8553a93bd9425650d86cda5054d_JaffaCakes118
Files
-
ef10e8553a93bd9425650d86cda5054d_JaffaCakes118.exe windows:4 windows x86 arch:x86
777fa5c9dc56b11430a8c6f3622cc941
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CopyFileA
SetFileAttributesA
GetFileAttributesA
MulDiv
FlushFileBuffers
LCMapStringW
LCMapStringA
GetSystemInfo
VirtualProtect
SetStdHandle
GetCPInfo
GetOEMCP
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
SetFilePointer
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
GetWindowsDirectoryA
UnhandledExceptionFilter
GetStdHandle
WriteFile
HeapSize
TerminateProcess
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
VirtualQuery
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetCommandLineA
GetStartupInfoA
GetPrivateProfileStringA
WritePrivateProfileStringA
ExpandEnvironmentStringsA
LoadLibraryA
GetProcAddress
InterlockedExchange
FreeLibrary
GetCurrentProcess
GetLastError
DeleteCriticalSection
InitializeCriticalSection
GetVersionExA
GetLocaleInfoA
GetModuleHandleA
HeapFree
HeapReAlloc
HeapAlloc
RtlUnwind
ExitProcess
GetACP
FreeEnvironmentStringsA
CloseHandle
user32
FindWindowA
ExitWindowsEx
EnumChildWindows
GetClassNameA
SetWindowLongA
GetWindowLongA
GetWindowTextA
SetCursor
CallWindowProcA
BeginPaint
DrawEdge
DrawTextA
EndPaint
GetClientRect
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
PostQuitMessage
DialogBoxParamA
PostMessageA
DefWindowProcA
EndDialog
MessageBoxA
IsDlgButtonChecked
CheckDlgButton
GetDlgItem
EnableWindow
gdi32
SetBkMode
SelectObject
SetTextColor
DeleteObject
ModifyWorldTransform
SetViewportOrgEx
SetWindowOrgEx
GetDeviceCaps
CreateFontIndirectA
SetGraphicsMode
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
ole32
OleInitialize
OleUninitialize
shlwapi
PathStripToRootA
comctl32
InitCommonControlsEx
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE