f:\Project\Public\VMonitor_WithTray\Release\VMonitor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0574b339e1c129f57f0c6550755a2072_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0574b339e1c129f57f0c6550755a2072_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0574b339e1c129f57f0c6550755a2072_JaffaCakes118
-
Size
144KB
-
MD5
0574b339e1c129f57f0c6550755a2072
-
SHA1
7ad47dedbe8b165997b867a5fd377707b99fa958
-
SHA256
a735377b529e40dc6374691720550898e4ef71eaa7b8506f552a3eff1ff32657
-
SHA512
8981105f898405fe85d4970694dd7bd7d520befce79db46cac633ce0ac1180a377988f20dc5c9814dc77479b1bb6237fef1a2e97d947b78f1e010f80ebb7fa01
-
SSDEEP
1536:nJ5cxp5yg9NAYRVE7Si5IQtw2kl7N3fsRkMDtNgp+/X:J5c/9gLYR30iwtNgp+v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0574b339e1c129f57f0c6550755a2072_JaffaCakes118
Files
-
0574b339e1c129f57f0c6550755a2072_JaffaCakes118.exe windows:4 windows x86 arch:x86
bfddeeebb40e87bf6d9b0c88e60076ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
ResetEvent
CreateThread
GetLastError
CreateMutexA
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
ReleaseMutex
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetConsoleMode
GetConsoleCP
SetFilePointer
SetEvent
ExitThread
OutputDebugStringW
OutputDebugStringA
CloseHandle
CreateEventW
CreateMutexW
LoadLibraryA
Sleep
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
WideCharToMultiByte
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
user32
DialogBoxParamA
MessageBoxA
EndDialog
TranslateMessage
GetCursorPos
SetForegroundWindow
TrackPopupMenu
AppendMenuA
CheckMenuItem
GetSubMenu
RemoveMenu
LoadAcceleratorsA
DestroyWindow
TranslateAcceleratorA
GetMessageA
DispatchMessageA
CreateWindowExA
RegisterDeviceNotificationA
LoadCursorA
RegisterClassExA
UnregisterDeviceNotification
PostQuitMessage
LoadIconA
LoadMenuA
BeginPaint
EndPaint
DefWindowProcA
PostMessageA
advapi32
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoGetMalloc
oleaut32
SysAllocString
SysFreeString
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE