C:\DistributedAutoLink\Temp\CompileOutputDir\backlnk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ef83d51c06e2d366531df751cc91872a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ef83d51c06e2d366531df751cc91872a_JaffaCakes118
-
Size
164KB
-
MD5
ef83d51c06e2d366531df751cc91872a
-
SHA1
15f0a32a59eaa2a2b1fac79c45cb0b84ea6fd05e
-
SHA256
60d8b42b232f274843e5841d93b8f7f8d3744c7a639c70388f00b2e548665b72
-
SHA512
d9149a9feb15bbc427b295fa051061d78770a87af2e474f502e9a698bf7a89e316d5f92c9d3ba120f2db60cb010998d17d047e22b3553a2c971eb257071bf83f
-
SSDEEP
3072:RfTNIFigZzIru6quY9yeeWeBcWLWErNluh082GL44VDN7wyWdcY9TuHKU:CUAuYV7rmqVciN+B9fU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef83d51c06e2d366531df751cc91872a_JaffaCakes118
Files
-
ef83d51c06e2d366531df751cc91872a_JaffaCakes118.exe windows:4 windows x86 arch:x86
79bf0e1420ec7af0f1aacbc5a97ada22
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetVersionExA
GetWindowsDirectoryA
CloseHandle
CreateProcessA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
GetVersion
lstrcmpiA
GetThreadLocale
lstrcmpiW
lstrlenA
CompareStringA
CompareStringW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetStringTypeExA
GetStringTypeExW
GetLocaleInfoW
GetTimeZoneInformation
FlushFileBuffers
SetConsoleCtrlHandler
IsValidCodePage
IsValidLocale
GetLocaleInfoA
GetACP
lstrlenW
InterlockedExchange
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
SetUnhandledExceptionFilter
GetOEMCP
GetCPInfo
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
HeapCreate
VirtualFree
IsBadWritePtr
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
LoadLibraryA
IsBadReadPtr
IsBadCodePtr
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
SetEnvironmentVariableA
user32
CharUpperW
CharUpperA
CharLowerW
CharLowerA
UnregisterClassA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE