c:\Road\discuss\Than\Make\neighbor\Earlyrock.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fffc6b1775ee2f9a3d52d667898097e2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fffc6b1775ee2f9a3d52d667898097e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fffc6b1775ee2f9a3d52d667898097e2_JaffaCakes118
-
Size
488KB
-
MD5
fffc6b1775ee2f9a3d52d667898097e2
-
SHA1
7c8a1387d10c6871aa07ca1eaa0b685370e910d1
-
SHA256
cea1a9304875b1d638ef993e37bb605790b9cc8ff4881abae972f584e0df6ecb
-
SHA512
32f77f9f67b480120b74ab2efc375e3c3ddf3af82380068d1d6168dac1ee9494d4e2215899ca3064461a4e5856c8e529f77ff1b4c9b8c12c93f943ca7aadb9bf
-
SSDEEP
6144:0liGIdbEAVa6tGfeRcgzNfNOkXcnii8rmCikLdXPT:0liZdAAgKzNlxsii8HPT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fffc6b1775ee2f9a3d52d667898097e2_JaffaCakes118
Files
-
fffc6b1775ee2f9a3d52d667898097e2_JaffaCakes118.exe windows:6 windows x86 arch:x86
5792e47dd70d029a67ac6962269dcad3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentDirectoryA
DuplicateHandle
GetModuleHandleA
OpenProcess
Sleep
GetTempPathA
CopyFileA
OpenMutexA
CreateFileA
GetCurrentThread
GetSystemDirectoryA
GetVolumeInformationA
GetVersionExA
LockResource
DeleteFileA
GetDateFormatA
ResetEvent
GetProcAddress
FindFirstChangeNotificationA
CreateDirectoryA
GetSystemTime
QueryPerformanceCounter
GetExitCodeProcess
CreateMutexA
GetEnvironmentVariableA
PeekNamedPipe
VirtualAlloc
DeviceIoControl
VirtualFree
GetCurrentProcess
LoadLibraryA
CreateFileW
HeapSize
ReadConsoleW
WriteConsoleW
SetStdHandle
FindNextFileA
FindFirstFileExA
FindClose
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
CloseHandle
SetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
GetLastError
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameA
GetACP
GetFileType
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
GetProcessHeap
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetCommandLineA
GetCommandLineW
VirtualProtect
comctl32
ImageList_Destroy
ImageList_SetIconSize
ImageList_GetImageCount
ImageList_SetBkColor
ImageList_AddMasked
ImageList_Remove
ole32
OleInitialize
CoRegisterClassObject
CoUninitialize
OleSetContainedObject
CoInitialize
OleUninitialize
CoRegisterSurrogate
shlwapi
PathGetDriveNumberA
PathFindFileNameA
wnsprintfA
PathIsUNCA
AssocQueryStringA
advapi32
SystemFunction036
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ