e:\code\netcut\netcut\Release\netcut.pdb
Static task
static1
Behavioral task
behavioral1
Sample
098636505c6099d1f56694e3ec167463_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
098636505c6099d1f56694e3ec167463_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
098636505c6099d1f56694e3ec167463_JaffaCakes118
-
Size
652KB
-
MD5
098636505c6099d1f56694e3ec167463
-
SHA1
e253a134c62d0bd2a9c16fa32e304f03c29c308e
-
SHA256
3e55dcab730e19f579a6e04a9e0f988567520276de1b0d5c7e550e61299a5190
-
SHA512
4724e7c5ecd524c7fc57b2e006f30cf9a7323e37a1e76b68bcde5487e61041618ba0abce6afcc30ab52385fe470e43b54728a05f276e8e5cbc8437f390a1969a
-
SSDEEP
3072:bFdgeS5bDhsW7CfYbZOOYIT2C5o04/Zo+:brg/B+fYs/IyzL/u+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 098636505c6099d1f56694e3ec167463_JaffaCakes118
Files
-
098636505c6099d1f56694e3ec167463_JaffaCakes118.exe windows:4 windows x86 arch:x86
642f331c74fd40e556c4907a6e852466
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
packet
PacketSetBuff
PacketSetReadTimeout
PacketReceivePacket
PacketGetNetInfoEx
PacketFreePacket
PacketGetVersion
PacketOpenAdapter
PacketGetAdapterNames
PacketSetHwFilter
PacketCloseAdapter
PacketAllocatePacket
PacketRequest
PacketSendPacket
PacketInitPacket
iphlpapi
GetIpForwardTable
SendARP
mfc71
ord1617
ord3946
ord1402
ord4244
ord5152
ord1908
ord5073
ord6275
ord4185
ord5214
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord2991
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4261
ord3195
ord572
ord620
ord1968
ord2264
ord3641
ord3441
ord5182
ord4212
ord4735
ord4890
ord2020
ord1671
ord1670
ord1551
ord5912
ord1401
ord5203
ord4262
ord605
ord354
ord1794
ord5807
ord4580
ord2662
ord4541
ord3683
ord628
ord587
ord5975
ord1122
ord3830
ord1054
ord2248
ord757
ord4038
ord4014
ord6278
ord3801
ord1620
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord3333
ord566
ord3182
ord673
ord4042
ord438
ord5833
ord1263
ord1084
ord2371
ord1903
ord2086
ord1545
ord4232
ord3164
ord1063
ord378
ord6090
ord4749
ord709
ord501
ord3934
ord1532
ord557
ord6305
ord6306
ord3389
ord4109
ord2902
ord5563
ord6180
ord907
ord3997
ord1207
ord1024
ord3109
ord3110
ord1248
ord2566
ord2657
ord4035
ord559
ord1123
ord2468
ord5419
ord1258
ord5715
ord2346
ord1580
ord1247
ord3255
ord5331
ord6297
ord5320
ord6286
ord266
ord265
ord1249
ord3651
ord2092
ord1641
ord1571
ord4238
ord3230
ord658
ord651
ord3401
ord5866
ord5746
ord5871
ord2866
ord6006
ord2368
ord4125
ord2372
ord2370
ord3879
ord416
ord2271
ord2794
ord1565
ord2495
ord1930
ord5873
ord2882
ord3761
ord3875
ord6067
ord4353
ord3161
ord2095
ord1591
ord4240
ord3317
ord741
ord5915
ord1554
ord1280
ord3163
ord1934
ord3210
ord3684
ord784
ord2322
ord762
ord1185
ord310
ord1482
ord304
ord876
ord781
ord297
ord578
ord745
ord1187
ord747
ord3174
ord764
ord912
ord6276
ord5529
msvcr71
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
__security_error_handler
memset
_ismbblead
atoi
ceil
memmove
_resetstkoflw
strtoul
strtod
time
srand
rand
malloc
free
??0exception@@QAE@ABV0@@Z
_CxxThrowException
_time64
_except_handler3
__CxxFrameHandler
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_XcptFilter
_exit
_c_exit
_setmbcp
kernel32
GetLocaleInfoA
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetModuleHandleA
ExitProcess
GetThreadLocale
GetVersionExA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
SetEvent
ResetEvent
Sleep
CreateDirectoryA
GetModuleFileNameA
lstrlenA
InitializeCriticalSection
GetACP
user32
EnableWindow
DrawIcon
AppendMenuA
SendMessageA
GetSystemMenu
IsIconic
IsWindowVisible
LoadIconA
GetClientRect
CopyRect
LockWindowUpdate
RedrawWindow
GetParent
GetSysColor
SetWindowLongA
GetWindowLongA
SetTimer
GetSystemMetrics
gdi32
CreateSolidBrush
shell32
Shell_NotifyIconA
ShellExecuteA
comctl32
ord17
oleaut32
VarDateFromStr
ws2_32
ntohl
htonl
ntohs
WSAStartup
inet_ntoa
gethostbyaddr
inet_addr
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 316KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE