C:\Temp\OP1ENT\V1++\C1ypto1\Evo2ution\old\release\main.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fe7ee2e0b6f2b2b87a68055a967a9be4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe7ee2e0b6f2b2b87a68055a967a9be4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe7ee2e0b6f2b2b87a68055a967a9be4_JaffaCakes118
-
Size
180KB
-
MD5
fe7ee2e0b6f2b2b87a68055a967a9be4
-
SHA1
bac162f70ce0f00ff9511ebfdf9a744ef8b2264f
-
SHA256
9f11b22e024a6a61e7e4e9fb08b13ff4f6d0ad398ab61038f6bfa6e2d1f43f68
-
SHA512
7941b019f6d52bcf78309592e95ef68a70cb9ad872b5185aabfe5300d5a5a07cd2c0068037a09c5e1dd516684a48149e9f74e7557d629e0e68b208ac2b9f7b76
-
SSDEEP
3072:JGTc2twdRJK45KlcR4nFq+9voKDKb57CJ0tjfVssPAbPJNSES3VE9:mc2t48R905mJSfVNPA9N5Sq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe7ee2e0b6f2b2b87a68055a967a9be4_JaffaCakes118
Files
-
fe7ee2e0b6f2b2b87a68055a967a9be4_JaffaCakes118.exe windows:4 windows x86 arch:x86
99ec6375f5fef79c1abb034eb71405ba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentThreadId
GetCommandLineA
GetModuleHandleA
LoadLibraryW
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
TlsAlloc
GetLocaleInfoA
MultiByteToWideChar
HeapSize
RtlUnwind
HeapReAlloc
VirtualAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSection
LoadLibraryA
IsDebuggerPresent
UnhandledExceptionFilter
TlsSetValue
FindFirstFileW
FindNextFileW
MoveFileW
RemoveDirectoryW
CreateFileA
GetFileSize
ReadFile
SetEndOfFile
CloseHandle
LocalFree
LocalAlloc
GetTempFileNameA
GetVersion
CreateThread
GetLastError
CreateProcessW
GetTickCount
Sleep
DeleteFileW
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
SetUnhandledExceptionFilter
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
user32
GetClassNameA
DefWindowProcW
GetAsyncKeyState
GetWindowLongA
GetMessagePos
GetClassInfoExA
FindWindowA
ReleaseDC
GetDC
DrawTextA
ValidateRect
InvalidateRect
BeginPaint
MapWindowPoints
DestroyMenu
CloseClipboard
SetClipboardData
DestroyWindow
OpenClipboard
IsWindowEnabled
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
CheckMenuRadioItem
CheckMenuItem
FrameRect
SetDlgItemInt
GetDlgItemInt
ShowScrollBar
gdi32
CreateRectRgn
GetPixel
PtVisible
CreateFontA
GetStockObject
DPtoLP
CreateDCA
GetObjectA
CreatePen
DeleteObject
DeleteDC
SetMapMode
SelectClipRgn
advapi32
RegisterServiceCtrlHandlerW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegEnumKeyW
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ