C:\Documents and Settings\tatsu\My Documents\Visual Studio 2008\Projects\mydoom\Release\mydoom.pdb
Static task
static1
Behavioral task
behavioral1
Sample
00e6ca57953b32689a455898720ae589_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00e6ca57953b32689a455898720ae589_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
00e6ca57953b32689a455898720ae589_JaffaCakes118
-
Size
86KB
-
MD5
00e6ca57953b32689a455898720ae589
-
SHA1
a1f3e5e88134be64ea37b93ccd34e53fe8a987d4
-
SHA256
e9f9cac0140b6859e783d51062e45f83b3c93b26833ab26d83ea9f1ce77a6c0e
-
SHA512
9f598c59e7368369631e06ce44cbe77165f247211a8ac1c4abce5651cda8c09bf19a9b7e17d97ff3cee9ac0895f28b61f39770d7625503e0f2b8cf370d1ba3ba
-
SSDEEP
1536:ScBDMBPERPyYHjW9Wx93//o3LB0ix2qJX5m7rlFQ:pDtDXvw2ix5JX5KjQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00e6ca57953b32689a455898720ae589_JaffaCakes118
Files
-
00e6ca57953b32689a455898720ae589_JaffaCakes118.exe windows:5 windows x86 arch:x86
792797ccb8b45b30d185d2d1dab6cdf7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
RegCreateKeyExW
ws2_32
inet_addr
ntohs
sendto
recv
connect
select
WSAGetLastError
htons
socket
__WSAFDIsSet
closesocket
gethostbyname
send
WSAStartup
ioctlsocket
user32
CharLowerW
CharUpperBuffW
CharUpperW
wvsprintfW
wsprintfW
kernel32
HeapSize
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetLocaleInfoA
EnterCriticalSection
LeaveCriticalSection
CreateProcessW
WaitForSingleObject
GetModuleHandleW
GetTickCount
WideCharToMultiByte
LoadLibraryW
GetTimeZoneInformation
lstrlenW
GetProcAddress
GetLocalTime
CloseHandle
ExitProcess
CreateMutexW
SystemTimeToFileTime
GetSystemTimeAsFileTime
WriteFile
GetSystemDirectoryW
Sleep
CopyFileW
GetFileAttributesW
GetModuleFileNameW
CreateFileW
ExitThread
GetTempPathW
GetLastError
lstrcatW
DeleteFileW
lstrcpyW
SetFileAttributesW
CreateThread
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
GetProcessHeap
lstrcpynW
lstrcmpW
GlobalFree
lstrcmpiW
GetTempFileNameW
GetFileSize
GlobalAlloc
ReadFile
GetEnvironmentVariableW
FindFirstFileW
MapViewOfFile
UnmapViewOfFile
GetDriveTypeW
GetCurrentThread
SetThreadPriority
FindClose
CreateFileMappingW
FindNextFileW
GetWindowsDirectoryW
SetFilePointer
GetSystemTime
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ