f:\Programmieren\Codesoft Releases\Infinity_Binder_v2.5\Boodah Version\stub\Release\stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0bb2b99c0fc11078ae033bcf763fe09a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0bb2b99c0fc11078ae033bcf763fe09a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0bb2b99c0fc11078ae033bcf763fe09a_JaffaCakes118
-
Size
106KB
-
MD5
0bb2b99c0fc11078ae033bcf763fe09a
-
SHA1
24da2fa7583a86fc0ac33bb9eaf4f756f6e2872d
-
SHA256
e8398c73b48a86a5eaed9069879eb1f578b11259e8ce169c1ce30f0b9d9d92c3
-
SHA512
30c2531dd8d5e07892eae034ff6d608cf43403005ed4a0bfc2ce712ea073e9554c16b716587e294561dfa7f10738c82c53a97d38e3bf242b16c5b29689618cbb
-
SSDEEP
1536:S8K7tX93Lz++rQtwsBnIc3oxs2xOwW7Xl+FKXRUJkU0S9lpArEjTxCGDkdpj3:IFVkvUw1ZhUJ9t9lpzTxCGD893
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0bb2b99c0fc11078ae033bcf763fe09a_JaffaCakes118
Files
-
0bb2b99c0fc11078ae033bcf763fe09a_JaffaCakes118.exe windows:4 windows x86 arch:x86
86d6c93ef34b6bdef2f6c1a522369a81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateToolhelp32Snapshot
GetEnvironmentVariableA
lstrcatA
lstrcpyA
GetShortPathNameA
Sleep
GetModuleHandleA
GetCurrentDirectoryA
GetWindowsDirectoryA
GetSystemDirectoryA
GetModuleFileNameA
Process32First
Module32First
Module32Next
GetTempPathA
Process32Next
SetEndOfFile
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
ExitProcess
HeapFree
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
GetLastError
LCMapStringW
GetCPInfo
VirtualQuery
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
WriteFile
FlushFileBuffers
SetFilePointer
CloseHandle
ReadFile
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetLocaleInfoA
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
HeapSize
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
LoadLibraryA
SetStdHandle
CreateFileA
GetLocaleInfoW
user32
wsprintfA
advapi32
RegSetValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
shell32
ShellExecuteA
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ