d:\Work\C-C++\SentiUpdater\release\SentiUpdater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fdd622d5ecf05231c7853b93edbae5d4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdd622d5ecf05231c7853b93edbae5d4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fdd622d5ecf05231c7853b93edbae5d4_JaffaCakes118
-
Size
14KB
-
MD5
fdd622d5ecf05231c7853b93edbae5d4
-
SHA1
9ca5884b7d9e48ee6bce245d81efa1987a6eee80
-
SHA256
8dbc02cbde8ff8819b3f863e425508dfe61d72fdbb951c4e38438ef28d1964ce
-
SHA512
e7bd833a7c6fd223e3d32fc3395959fb7b8f99603291fe432c0e25f34b98ef1356a3820025e3be0475c0da1fc54d195af12f100add853e9ef7d8c83c766d19c4
-
SSDEEP
384:U1Jbeg424pl/HJuqfFU5+MB5tkuB5Hw6Vp0xO96t3s:UPul/phdUnLW6j0xOsc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fdd622d5ecf05231c7853b93edbae5d4_JaffaCakes118
Files
-
fdd622d5ecf05231c7853b93edbae5d4_JaffaCakes118.exe windows:4 windows x86 arch:x86
8011684a0b6806cce6cd8b6cde7731bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
MoveFileExA
WriteFile
GetLastError
CloseHandle
GetTempPathA
DeleteFileA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
DispatchMessageA
GetActiveWindow
DefWindowProcA
TranslateAcceleratorA
FindWindowA
LoadCursorA
DestroyWindow
GetMessageA
RegisterClassExA
PostQuitMessage
SendMessageA
TranslateMessage
MessageBoxA
CreateWindowExA
shell32
ShellExecuteA
wininet
InternetOpenA
InternetGetConnectedState
InternetReadFile
InternetOpenUrlA
InternetCanonicalizeUrlA
InternetCloseHandle
shlwapi
SHSetValueA
SHGetValueA
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?at@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@D@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
msvcr80
__p__commode
__CxxFrameHandler3
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
atoi
strtok
strcpy_s
??3@YAXPAX@Z
??2@YAPAXI@Z
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
memset
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ