g:\acro_root_vgd\viewer\win\output\acrobat\AcroRd32Exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
03c5ea893f50dbbbe9b59d700480ae3e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03c5ea893f50dbbbe9b59d700480ae3e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
03c5ea893f50dbbbe9b59d700480ae3e_JaffaCakes118
-
Size
64KB
-
MD5
03c5ea893f50dbbbe9b59d700480ae3e
-
SHA1
606b3594617d3cd0db0ed6ab8882fb276927625d
-
SHA256
ab80e4ce87714d3416fbcd81c441aabd1d9f25d2bf4d3972b22455f5a6d1e1a7
-
SHA512
0f9f1ce18389ac78ea5313c9ee7648cbb8453373a76839a7467815e35d28689175cf776e6945b3fd1679af13a82c85180928c5c5f7944a815d0301441085b48f
-
SSDEEP
768:2GTymjuCjqO021qVlj5G+ax10vZP5kcN16DyvGgzqn4N8+p1KQqZ8hU07oHK:2aqOM9fv5kcw6Gb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03c5ea893f50dbbbe9b59d700480ae3e_JaffaCakes118
Files
-
03c5ea893f50dbbbe9b59d700480ae3e_JaffaCakes118.exe windows:4 windows x86 arch:x86
bd3506bafcb80aaf6787e5065d8a8f40
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
UnmapViewOfFile
CreateFileA
VirtualQueryEx
GetCurrentProcess
MapViewOfFile
CreateFileMappingA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
ReadFile
CloseHandle
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
LoadLibraryA
FreeLibrary
GetProcAddress
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetSystemInfo
IsDebuggerPresent
OutputDebugStringA
SetFilePointer
GetVersionExA
GetStartupInfoA
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
user32
FindWindowA
SendMessageA
MessageBoxA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegQueryValueA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?_Nomemory@std@@YAXXZ
msvcr71
_snprintf
__CxxFrameHandler
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBD@Z
??3@YAXPAX@Z
??1exception@@UAE@XZ
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
_CxxThrowException
??_V@YAXPAX@Z
strchr
free
strrchr
malloc
_callnewh
__security_error_handler
_except_handler3
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE