K:\EmuVSProject\SRCs\Client\GUP\GUP.v.1.6.src\bin\GUP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
065bae05b6a1a0d2aa52f6fc5ce73f51_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
065bae05b6a1a0d2aa52f6fc5ce73f51_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
065bae05b6a1a0d2aa52f6fc5ce73f51_JaffaCakes118
-
Size
286KB
-
MD5
065bae05b6a1a0d2aa52f6fc5ce73f51
-
SHA1
8df67e8a4ac9a8a80318350c50c2113b6b5b9695
-
SHA256
b0a98d94fe97907edc91b7f9aebeabfa6f1fecb48c52a861ec94bd0837b30a1e
-
SHA512
63a0d9c5dcfb37309c9d600e32e48b692d87976a05b24f9d27dcbf05bddd6c823a3b70d1c98b24d7f4d0fb3dc04f49f5b2597866df024aae9ff3c25989a31f56
-
SSDEEP
6144:+hsNjqouztPVd5i1UrT3d8E+cdnqAXkmIZTBrCORcSsQLH5Ad7:WwxuzfO+rxLIZTlwSsPd7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 065bae05b6a1a0d2aa52f6fc5ce73f51_JaffaCakes118
Files
-
065bae05b6a1a0d2aa52f6fc5ce73f51_JaffaCakes118.exe windows:5 windows x86 arch:x86
3707fd2e8060858c46ba15b717fb4d8a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
ws2_32
__WSAFDIsSet
WSASetLastError
listen
accept
recvfrom
sendto
gethostname
getaddrinfo
freeaddrinfo
socket
connect
setsockopt
getpeername
getsockopt
htons
bind
ntohs
getsockname
send
recv
WSAGetLastError
closesocket
WSAStartup
WSACleanup
ioctlsocket
select
wldap32
ord143
ord60
ord50
ord26
ord30
ord32
ord35
ord79
ord200
ord33
ord301
ord27
ord22
ord46
ord211
ord41
kernel32
WaitForSingleObject
CloseHandle
FormatMessageA
ExpandEnvironmentStringsA
GetTickCount
LoadLibraryA
GetProcAddress
FreeLibrary
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
GetStdHandle
GetFileType
WaitForMultipleObjects
PeekNamedPipe
ReadFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
SetLastError
GetLastError
SleepEx
CreateThread
GetCurrentDirectoryA
Sleep
user32
DialogBoxParamW
FindWindowExA
SetDlgItemInt
MessageBoxA
SystemParametersInfoW
GetWindowRect
SetWindowPos
CreateWindowExW
SetWindowTextA
SendMessageW
GetDlgItemTextA
SetDlgItemTextA
EndDialog
GetDlgItemInt
shell32
ShellExecuteA
msvcr100
_ismbblead
_XcptFilter
_exit
_initterm_e
_configthreadlocale
__setusermatherr
_commode
exit
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_acmdln
_fmode
_initterm
_stricmp
_strdup
_close
_fileno
_open
_read
_strnicmp
_CxxThrowException
__set_app_type
_cexit
__getmainargs
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
isgraph
isprint
isupper
islower
_stat64
_beginthreadex
__sys_nerr
strerror
getenv
_lseeki64
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
sscanf
fputs
atoi
fgets
fopen
fprintf
_purecall
ftell
fseek
fclose
strncmp
isspace
isalnum
tolower
isalpha
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
memmove
fflush
fwrite
calloc
realloc
free
malloc
memset
memcpy
_time64
strchr
fread
__iob_func
strtoul
strstr
isxdigit
strncpy
strrchr
_strtoi64
qsort
isdigit
strtol
fputc
_errno
memchr
_gmtime64
_fstat64
__CxxFrameHandler3
msvcp100
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
Sections
.text Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ