M:\flash\other\C++\PECrypt\platform2\release\platform2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0c986993ccc8f560435bd58e52b9f11e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0c986993ccc8f560435bd58e52b9f11e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c986993ccc8f560435bd58e52b9f11e_JaffaCakes118
-
Size
297KB
-
MD5
0c986993ccc8f560435bd58e52b9f11e
-
SHA1
014ced85a089db60e071b85a67c7e238831ab916
-
SHA256
fd9cef1a8112234730288334888f6ca4f7b0a72d3bc6dc5dc6cc93bae86a14d4
-
SHA512
4a73c97b4e3dda37d25a13d51ca0b38ad7acd1339020f18ae02dba422a7d03733287b8e11577b788a9149a4e3cfcfd71faf736dee93cbd638685c035be71de92
-
SSDEEP
6144:JqtmIEy9/IPYiBIpeHvcMmzsYlsmI1tqk/TOVeqa2pC0:ktmIE3dBFH00KsmI1tqk/6eZ2p/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c986993ccc8f560435bd58e52b9f11e_JaffaCakes118
Files
-
0c986993ccc8f560435bd58e52b9f11e_JaffaCakes118.exe windows:5 windows x86 arch:x86
43f97560f7577b51120fdb8646c2834a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadFile
CreateDirectoryA
GetLastError
GetProcAddress
LoadLibraryA
SetNamedPipeHandleState
GetCurrentThreadId
CloseHandle
lstrcpyA
CreateFileW
SetStdHandle
WriteConsoleW
SetFilePointer
GetStringTypeW
LCMapStringW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapSize
MultiByteToWideChar
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
Sleep
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
GetProcessHeap
WriteFile
WaitNamedPipeA
GetCurrentProcess
HeapAlloc
HeapReAlloc
CreateFileA
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapFree
IsProcessorFeaturePresent
EncodePointer
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
user32
DestroyWindow
GetDlgItemInt
GetWindowRect
SendDlgItemMessageA
LoadBitmapA
GetParent
LoadMenuA
LoadIconA
GetClientRect
SetFocus
SendMessageA
EnumWindows
PtInRect
OffsetRect
GetWindowTextA
MessageBoxA
GetMenuState
GetDlgItem
DefWindowProcA
GetDesktopWindow
SetWindowPos
CheckDlgButton
ShowWindow
IsDlgButtonChecked
SetCaretPos
UpdateWindow
EnableWindow
FindWindowA
GetDlgCtrlID
DialogBoxParamA
CheckMenuItem
CopyRect
gdi32
CreateSolidBrush
comdlg32
ChooseColorA
Sections
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 189KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ