d:\dev\vc\me\Nc\Act\Release\Act.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f586d57dc07cac409370ffc70e75b621_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f586d57dc07cac409370ffc70e75b621_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f586d57dc07cac409370ffc70e75b621_JaffaCakes118
-
Size
112KB
-
MD5
f586d57dc07cac409370ffc70e75b621
-
SHA1
8e6ca1a662a70a8da8b445e2d0693fba9d78d428
-
SHA256
638e7e2e1ddc8cba3c3f602a684539bffa33003dbf46401eea2a208020e65ab8
-
SHA512
054764be514e85499fbf4b731b91398a00b452876ce04727af31b385651dd0b2e131c3dad837994f69576e2c15bb41a9ed983608407975f8785e98f26e606103
-
SSDEEP
3072:sWlJUJtFkLms8QbXETgaDu0INNBF++lM:DUN/Du32L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f586d57dc07cac409370ffc70e75b621_JaffaCakes118
Files
-
f586d57dc07cac409370ffc70e75b621_JaffaCakes118.exe windows:4 windows x86 arch:x86
85c84161d83f9d3d4c250970dd1543a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindNextFileA
FindClose
FreeLibrary
LocalFree
GetVersionExA
MapViewOfFile
UnmapViewOfFile
ExitProcess
CreateFileA
SystemTimeToFileTime
SetFileTime
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
WriteFile
FindFirstFileA
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsBadCodePtr
FlushFileBuffers
SetStdHandle
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetCPInfo
GetOEMCP
CloseHandle
OpenProcess
DeleteFileA
CopyFileA
Sleep
CreateMutexA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
WideCharToMultiByte
InterlockedDecrement
FormatMessageA
GetLastError
ReadFile
GetACP
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
VirtualQuery
GetTimeZoneInformation
LCMapStringW
InterlockedExchange
IsBadWritePtr
VirtualAlloc
VirtualFree
LCMapStringA
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetCurrentProcess
MultiByteToWideChar
lstrlenA
GetSystemTimeAsFileTime
IsBadReadPtr
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
user32
DispatchMessageA
RegisterClassExA
CreateWindowExA
MessageBoxA
SetWindowTextA
TranslateMessage
ShowWindow
UpdateWindow
PostMessageA
SetTimer
GetMessageA
PostQuitMessage
GetClassNameA
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
DestroyWindow
FindWindowA
EndPaint
BeginPaint
DefWindowProcA
TranslateAcceleratorA
advapi32
RegQueryInfoKeyA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
SetSecurityInfo
SetEntriesInAclA
GetSecurityInfo
shell32
ShellExecuteA
ole32
CoCreateInstance
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
VariantClear
userenv
GetProfilesDirectoryA
urlmon
CreateURLMoniker
wininet
InternetReadFile
InternetOpenA
InternetSetOptionA
InternetOpenUrlA
HttpQueryInfoA
InternetCloseHandle
netapi32
Netbios
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ