C:\code\vzagruzke-trunk\Release\Judas.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f6dee6c06d75e802fa4853d83d491c89_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6dee6c06d75e802fa4853d83d491c89_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
f6dee6c06d75e802fa4853d83d491c89_JaffaCakes118
-
Size
169KB
-
MD5
f6dee6c06d75e802fa4853d83d491c89
-
SHA1
745f24ec0c101a494fb87289de36a85184184328
-
SHA256
257e86d514653f5603ffedf93eaaae0e1fbf9434cb9203a559c7067562a3253b
-
SHA512
0dfa5718d9a01f7f7001eabdbe9519335f888c3840a4ba8b11b5e6e5ae6690f5ae14df5912700b9ad709377b5ec913ddcfb937f2bcb56b87ada7eb8363c58512
-
SSDEEP
1536:kZVE5ysqFnuQJJFekLuW8QVuJuCNNqwfiMc4D1094R0ASZPFnqpN0EWlN:kf6quQeQVuJxNfl109g0ASZPFnqpAD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6dee6c06d75e802fa4853d83d491c89_JaffaCakes118
Files
-
f6dee6c06d75e802fa4853d83d491c89_JaffaCakes118.exe windows:5 windows x86 arch:x86
ab5be79be3f6beb1c7644085f1e46f16
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateThread
lstrcatW
GetModuleHandleW
GetTempPathW
CopyFileW
lstrlenW
SetEndOfFile
CreateFileW
CreateFileA
SetStdHandle
WriteConsoleW
LoadLibraryW
ExitProcess
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
HeapSize
GetLocaleInfoW
GetSystemTimeAsFileTime
GetLastError
CreateMutexW
MultiByteToWideChar
GetModuleFileNameW
Sleep
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetEnvironmentStringsW
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetDriveTypeW
GetFullPathNameA
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentDirectoryW
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetStdHandle
GetFileType
GetProcAddress
WriteFile
GetConsoleCP
GetConsoleMode
IsProcessorFeaturePresent
SetFilePointer
ReadFile
FlushFileBuffers
HeapCreate
CloseHandle
FreeEnvironmentStringsW
GetProcessHeap
user32
TranslateAcceleratorW
LoadAcceleratorsW
DispatchMessageW
LoadIconW
LoadCursorW
LoadStringW
TranslateMessage
GetMessageW
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcW
DestroyWindow
DialogBoxParamW
UpdateWindow
CreateWindowExW
RegisterClassExW
advapi32
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
shell32
ShellExecuteW
winhttp
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpCloseHandle
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ