C:\Users\DarkCoderSc\Desktop\Celesty Binder\Stub\DYNAMIC\Stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
049ab1429e04a81d48059af3023e303b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
049ab1429e04a81d48059af3023e303b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
049ab1429e04a81d48059af3023e303b_JaffaCakes118
-
Size
933KB
-
MD5
049ab1429e04a81d48059af3023e303b
-
SHA1
7e5c378341571af7af0ebc3336dc50452d5b6289
-
SHA256
e45c8b0d589e04f4deb858d74e2c82424b10fae3aeb1a4227c40ebe7d25837f8
-
SHA512
977eda5d8ea66da4ec58a382fd55d2dbf7f943797277bd456b3fada11a19cfa531a86c417e49b783963c64a7b95377108a870784d6e6c1b40a06d98952e9a5d2
-
SSDEEP
24576:Y+vrrucFqn8Ic3ewGYIayEaHPMrM7OujUflhvSzQp:Y+vrqz8TKtv7vMo7rQvvS8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 049ab1429e04a81d48059af3023e303b_JaffaCakes118
Files
-
049ab1429e04a81d48059af3023e303b_JaffaCakes118.exe .pdf windows:5 windows x86 arch:x86 polyglot
544859dbf19bf9d05a05fe6e02b79d34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
FindResourceA
FreeLibrary
LoadResource
WriteFile
SizeofResource
GetProcAddress
LoadLibraryA
LockResource
EnumResourceNamesA
CloseHandle
FreeResource
GetWindowsDirectoryA
OutputDebugStringA
GetTempPathA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
shell32
ShellExecuteA
SHGetSpecialFolderPathA
msvcp100
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
msvcr100
_cexit
_exit
_XcptFilter
_ismbblead
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_crt_debugger_hook
__getmainargs
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
__dllonexit
_unlock
??2@YAPAXI@Z
exit
??3@YAXPAX@Z
memmove
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
_lock
?terminate@@YAXXZ
_onexit
memcpy
_CxxThrowException
__CxxFrameHandler3
_amsg_exit
memset
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 916KB - Virtual size: 916KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ