C:\proprietary\its\pickup\WarningA.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f522487f36f2c8490aac7ac65b45d558_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f522487f36f2c8490aac7ac65b45d558_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f522487f36f2c8490aac7ac65b45d558_JaffaCakes118
-
Size
308KB
-
MD5
f522487f36f2c8490aac7ac65b45d558
-
SHA1
ca2d0419823a20d2d827ac0da62331abccea147a
-
SHA256
d67bdddb74d8d57d7924aa407f62fd13a110ef7a6892fc9937feb9168322dfde
-
SHA512
7431faeeb2d1dad085faf4edeca589458d86924089e5a10d6e8a9cb8a09e17ebfb9d7b505c71d07913b3e4daedc04f0cd231be345ace2627d594438062cf00d5
-
SSDEEP
6144:dzswacTgcVkzm5bdm6OrY/7Pjn2v0xW0Tz65w1zsr:Js5czf5bd9OrC7Pj2GW0/o6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f522487f36f2c8490aac7ac65b45d558_JaffaCakes118
Files
-
f522487f36f2c8490aac7ac65b45d558_JaffaCakes118.exe windows:5 windows x86 arch:x86
da6f69d97d25eea8634a6fb95c76176c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryExW
EncodePointer
CreateFileW
WriteConsoleW
SetFilePointerEx
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetProcessHeap
GetStringTypeW
SetStdHandle
GetSystemTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
CloseHandle
GetConsoleWindow
lstrcpynA
GetProcAddress
ResetEvent
GetCommState
CreateFileA
GetLastError
lstrcatA
GetModuleHandleA
GetCurrentProcess
lstrlenA
SetSystemPowerState
GetFileType
LCMapStringW
HeapAlloc
HeapFree
GetACP
GetModuleHandleExW
ExitProcess
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
WriteFile
GetStdHandle
FreeLibrary
DecodePointer
TlsFree
TlsSetValue
TlsGetValue
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
user32
EndDialog
DrawFrameControl
InsertMenuItemA
GetMenuStringA
EnableMenuItem
LoadIconA
DrawMenuBar
SendMessageA
SetLayeredWindowAttributes
CreateWindowExA
EnumWindows
GetSystemMenu
RegisterClassA
GetMenuItemID
LoadCursorA
InflateRect
SetWindowPos
GetMenuItemCount
PostMessageA
GetWindowRect
GetSystemMetrics
CreatePopupMenu
SetTimer
SetWindowLongA
GetWindowTextA
GetWindowLongA
MessageBoxA
gdi32
SelectObject
GetTextExtentPoint32A
CreateCompatibleDC
GetColorAdjustment
DeleteDC
GdiComment
SetDCPenColor
CreateCompatibleBitmap
comdlg32
ChooseColorA
advapi32
OpenProcessToken
ole32
CoInitialize
StgOpenStorage
ws2_32
WSACreateEvent
WSAGetLastError
WSAEnumNetworkEvents
recv
WSAEventSelect
WSACloseEvent
closesocket
msacm32
acmDriverOpen
winmm
auxSetVolume
joyConfigChanged
shlwapi
UrlEscapeW
StrCmpNIA
StrToIntA
StrTrimA
StrCSpnA
PathRemoveArgsA
UrlHashA
UrlCompareW
UrlGetPartA
UrlGetLocationA
UrlCombineW
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ