c:\Documents and Settings\Nguyen Huy Khanh\My Documents\Visual Studio Projects\HocLom\HocLom\Debug\HocLom.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f643938668707235c8443bd28c30bddf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f643938668707235c8443bd28c30bddf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f643938668707235c8443bd28c30bddf_JaffaCakes118
-
Size
156KB
-
MD5
f643938668707235c8443bd28c30bddf
-
SHA1
c5634aa12f990cd72961f8f1cc4f0a3cd646d1e4
-
SHA256
188c1aa4655d02bdbcffd41a50819cb7fafaf15abb2b1ad84cec2238c85e787a
-
SHA512
f652e35868c27238444fef99bdadaa63a73542294a6c9843e2849fd631355fee65019b9ac8686d53ac37aee837364cf2d28b068e1d12b28e68f5ef5e2fd491da
-
SSDEEP
3072:1nEbPQR4ca5LzCbLhHwP5IfQFRPas0kNBJwgxcFGqla4dg:ZEbQR4caIHhH/YRPFjJwycF5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f643938668707235c8443bd28c30bddf_JaffaCakes118
Files
-
f643938668707235c8443bd28c30bddf_JaffaCakes118.exe windows:4 windows x86 arch:x86
76886c973da7bb2767346f0fdd8094a3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadProcessMemory
OpenProcess
CloseHandle
SetStdHandle
GetLocaleInfoA
GetSystemInfo
VirtualProtect
SetFilePointer
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
SetConsoleCtrlHandler
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
DebugBreak
RaiseException
GetProcAddress
LoadLibraryA
IsBadWritePtr
IsBadReadPtr
HeapValidate
TerminateProcess
GetCurrentProcess
ExitProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
WriteFile
HeapAlloc
GetProcessHeap
FreeLibrary
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
HeapReAlloc
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualQuery
InterlockedExchange
FlushFileBuffers
user32
DialogBoxParamA
MessageBoxA
EndDialog
VkKeyScanA
MapVirtualKeyA
PostMessageA
FindWindowA
GetWindowThreadProcessId
LoadIconA
SendMessageA
GetDlgItem
parasite
?Hook@@YAHPAUHWND__@@@Z
?WM_HOOK_WRITE@@3IA
?UnHook@@YAXPAUHWND__@@@Z
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ