c:\Documents and Settings\Administrator\Desktop\rbot-0.3.2-fix1-public\sdbot05b___Win32_Debug\rBot032.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fff914204c41b0e6b488a508008ea021_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fff914204c41b0e6b488a508008ea021_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fff914204c41b0e6b488a508008ea021_JaffaCakes118
-
Size
294KB
-
MD5
fff914204c41b0e6b488a508008ea021
-
SHA1
ad0cee88122797ae415f22fe1411ff99c4f5f6ea
-
SHA256
3315307fe9e6ae278848da06afd330edbda9facfb536fc142ace31be8f1b930a
-
SHA512
0c4d42896e45c9989048aa5bec560cea35442f6b563eac69038cfb8a2bac3f3ceb8310c6bafb5a87543397bbf77878ffcf0669ee9ea6c1355b9bbb81b41bf9de
-
SSDEEP
3072:3xZ3nm+11mTVwt3Vnwx3h9dwa1ZrgBlEwQKsB8l0BRXUmSbDAS7upJe0/jWDlzdt:hZXmk5VwVfaa1ZGlJsBJBRXULlkID/E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fff914204c41b0e6b488a508008ea021_JaffaCakes118
Files
-
fff914204c41b0e6b488a508008ea021_JaffaCakes118.exe windows:4 windows x86 arch:x86
74fb407effb27d3f3c160e0cf4e26292
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mpr
WNetAddConnection2A
WNetCancelConnection2A
ws2_32
ntohl
ioctlsocket
select
gethostbyaddr
inet_ntoa
getsockname
bind
WSAAsyncSelect
accept
__WSAFDIsSet
send
socket
connect
WSASocketA
setsockopt
htons
htonl
sendto
WSAGetLastError
inet_addr
gethostbyname
WSAStartup
WSACleanup
closesocket
recv
listen
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
kernel32
WriteConsoleA
ReadFile
FlushFileBuffers
SetStdHandle
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoW
GetLocaleInfoA
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RaiseException
RtlUnwind
CreateProcessA
CopyFileA
GetSystemDirectoryA
GetConsoleOutputCP
GetLastError
CreateMutexA
GetTempPathA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
GetLocalTime
CreateThread
GetComputerNameA
DeleteFileA
TerminateThread
ExpandEnvironmentStringsA
CloseHandle
WriteFile
CreateFileA
GetVersionExA
GlobalMemoryStatus
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileType
SetHandleCount
HeapReAlloc
WriteConsoleW
GetTimeZoneInformation
SetEndOfFile
CompareStringA
CompareStringW
Sleep
SetEnvironmentVariableA
VirtualAlloc
VirtualFree
ExitProcess
HeapFree
HeapAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetConsoleCtrlHandler
InterlockedExchange
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
HeapDestroy
HeapCreate
user32
SendMessageA
FindWindowA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
shell32
ShellExecuteA
Sections
.text Size: 245KB - Virtual size: 245KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ