g:\Projects\Process\Process\Release\Process.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f6fb2ec81f7610fa1d4220a1e65b08d6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6fb2ec81f7610fa1d4220a1e65b08d6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6fb2ec81f7610fa1d4220a1e65b08d6_JaffaCakes118
-
Size
52KB
-
MD5
f6fb2ec81f7610fa1d4220a1e65b08d6
-
SHA1
e05b7dc22f72da1163de7da3516d89d6c82ac69a
-
SHA256
0fad3e881039eaeb64ee40ba4332b2797990af07ff7f367badd80078b7114ec7
-
SHA512
08f19109e1f1f800cb28c0b22a3620ac710de60975d1f114c810686e4d5708171b5fdebc2f528a41a32224afaf500253c679a7b7911be2149ee8c08ef254aa82
-
SSDEEP
768:uRWMA68kDGXcK1JP9COApZsLUFDeLHAwu0aB0wWYS/a/x9GYDM0+0O:ukMKH9fApDFPgiKMM0I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6fb2ec81f7610fa1d4220a1e65b08d6_JaffaCakes118
Files
-
f6fb2ec81f7610fa1d4220a1e65b08d6_JaffaCakes118.exe windows:4 windows x86 arch:x86
674ead00063f238494b4725620612b42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
GetProcessAffinityMask
OpenProcess
Sleep
TerminateProcess
WaitForSingleObject
SetPriorityClass
lstrcmpiA
HeapFree
ResumeThread
SuspendThread
GetVersionExA
WideCharToMultiByte
HeapAlloc
CloseHandle
GlobalFree
GlobalAlloc
FileTimeToSystemTime
SystemTimeToFileTime
GetSystemTime
LocalFree
FormatMessageA
HeapSize
RtlUnwind
LCMapStringW
LCMapStringA
VirtualQuery
GetSystemInfo
SetProcessAffinityMask
LoadLibraryA
GetProcAddress
FreeLibrary
GetProcessHeap
GetCurrentProcess
ExitProcess
GetModuleHandleA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetACP
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
GetLocaleInfoA
VirtualProtect
SetStdHandle
user32
CloseDesktop
EnumDesktopWindows
GetWindowThreadProcessId
PostMessageA
OpenDesktopA
advapi32
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetTokenInformation
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ