c:\workarea\8.702\apps\ccc\Source\Utilities\MMPreview\MMLoadDrv\MMLoadDrv\build\rel\MMLoadDrv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
081ba57555fd752e2e96979c24a88d4e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
081ba57555fd752e2e96979c24a88d4e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
081ba57555fd752e2e96979c24a88d4e_JaffaCakes118
-
Size
284KB
-
MD5
081ba57555fd752e2e96979c24a88d4e
-
SHA1
2c0c91bf5785a2e9132a2af314217e927ec73616
-
SHA256
853b95f872f141ed38972fb79b4bbc84255e4fd4743d90ff64e5a6d4379cdb6c
-
SHA512
9c6650c7df4129a4f7896c7ebcfd22b777871974fecf1a85ad52c56f32c8b0031296099da737b36b07099bdcf8641babf4dc748d9096e04dbcb98abb90c60bd7
-
SSDEEP
6144:P9OkxmlAt7WiO7KuEiaNXcBJ/nzpzSC3Wbx2i+y6:Pndt78Sd+zB3WbQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 081ba57555fd752e2e96979c24a88d4e_JaffaCakes118
Files
-
081ba57555fd752e2e96979c24a88d4e_JaffaCakes118.exe windows:4 windows x86 arch:x86
621eaebede999b645b1d1215485a6d57
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
QueryPerformanceCounter
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
Sleep
CloseHandle
WaitForSingleObject
InterlockedExchange
InterlockedIncrement
InterlockedDecrement
CreateEventA
SetEvent
ResetEvent
GetCurrentProcess
GetCurrentThreadId
GetCurrentProcessId
FreeLibrary
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
GetTickCount
CreateThread
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
InterlockedCompareExchange
user32
wsprintfA
GetClientRect
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
PostMessageA
LoadAcceleratorsA
LoadStringA
SetRect
gdi32
GetStockObject
ole32
CoTaskMemAlloc
CoInitialize
CoCreateInstance
CoFreeUnusedLibraries
CoUninitialize
CoTaskMemFree
msvcr80
_crt_debugger_hook
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_invoke_watson
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
?terminate@@YAXXZ
_controlfp_s
_amsg_exit
memset
memcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
_wtoi
__CxxFrameHandler3
_purecall
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.T� Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE