C:\Documents and Settings\salvo\Desktop\Loader\Debug\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0396eab103a36299e55da94a8fdbbc31_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0396eab103a36299e55da94a8fdbbc31_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0396eab103a36299e55da94a8fdbbc31_JaffaCakes118
-
Size
32KB
-
MD5
0396eab103a36299e55da94a8fdbbc31
-
SHA1
de2881f17da946240d6144b89f6746a576bc2fa1
-
SHA256
a06bd23be76856169c9c9b614093b1727b2d2d8fbb0303d230bee95d6dc40f19
-
SHA512
fb6dc25a7697ebbe5e83131ff0418a5877e77d92f4fb17eb3da826542fccaf7dc28695819a5c248f7822998be813d3c9551abad7cea8a1ca422d3ba35b68f110
-
SSDEEP
384:SIB/9MUphtk9/YboeayV1g5qlx6vGwUbbmo2F+jZutbECLL:SIB/9MUpU9+X+q+dUuo2F19/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0396eab103a36299e55da94a8fdbbc31_JaffaCakes118
Files
-
0396eab103a36299e55da94a8fdbbc31_JaffaCakes118.exe windows:5 windows x86 arch:x86
80a37b407f6efb4282e09c40ddc54cf7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
VirtualProtect
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
CreateToolhelp32Snapshot
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetModuleFileNameA
Sleep
Process32First
CloseHandle
GetModuleHandleA
Process32Next
VirtualQuery
GetModuleFileNameW
GetProcessHeap
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
LoadLibraryA
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
DebugBreak
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
FreeLibrary
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
msvcr90d
_exit
_XcptFilter
_cexit
exit
__initenv
_CrtSetCheckCount
_CrtDbgReportW
_initterm
_initterm_e
_crt_debugger_hook
?terminate@@YAXXZ
_controlfp_s
_invoke_watson
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_amsg_exit
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_CRT_RTC_INITW
printf
system
strcpy
memset
memcpy
_time64
_localtime64
sprintf
strlen
_vsnprintf
fopen
fprintf
fclose
__getmainargs
_stricmp
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ