D:\new2DNet\Rocket\Product\Rocket.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0c09317512bfde53b173ef76bb5926a5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0c09317512bfde53b173ef76bb5926a5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c09317512bfde53b173ef76bb5926a5_JaffaCakes118
-
Size
52KB
-
MD5
0c09317512bfde53b173ef76bb5926a5
-
SHA1
c02a3e33df4098db2a4ca452e82d6d7cc496ebde
-
SHA256
5f5c096617a94e42c10c427de81acc5195ca66afb7d8d91c58f6ba3410abaf3a
-
SHA512
dbb7a6615bdd1adefd064e8ed324b145e72d575954ab2ffc367b43c15ed05b6b95dc4cc77d6c0dcbbc3c5a6f10ba92f2254c34dd4efe0c6085e050ff89d49943
-
SSDEEP
768:gjbFGqQYOdQVVxKF4+GUhl1EsinMFMHh2mNqnsMME73OpKNwsweu/qnrhZ5Mki:Q2QVxKF03bNA7scwsN3rhZuH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c09317512bfde53b173ef76bb5926a5_JaffaCakes118
Files
-
0c09317512bfde53b173ef76bb5926a5_JaffaCakes118.exe windows:5 windows x86 arch:x86
1211e578b49291efa65261752c9df91a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatA
MultiByteToWideChar
lstrcmpiA
GetProcAddress
CopyFileA
LoadLibraryA
SetNamedPipeHandleState
GetModuleFileNameA
lstrcmpiW
GetModuleHandleA
VirtualProtect
GetVersionExA
GetTempPathA
lstrcpyW
DeleteFileA
lstrcpyA
GetFileSize
FindResourceA
FreeResource
SetEndOfFile
GetSystemDirectoryA
LoadResource
GetCurrentProcess
Process32First
GetSystemTimeAsFileTime
SizeofResource
CreateProcessA
Process32Next
LockResource
CreateToolhelp32Snapshot
LocalFree
SetEvent
ExitThread
lstrlenW
OpenEventA
OutputDebugStringA
DuplicateHandle
GetCurrentProcessId
GetSystemTime
CreateThread
CreateEventA
Sleep
OpenProcess
GetCommandLineA
WaitForSingleObject
VirtualQuery
lstrlenA
ExitProcess
CloseHandle
DeviceIoControl
VirtualAlloc
GetLastError
ReadFile
WriteFile
VirtualFree
SetFilePointer
FreeLibrary
CreateFileA
user32
FindWindowA
PostMessageA
SendMessageA
wsprintfW
wsprintfA
advapi32
SetEntriesInAclA
RegCloseKey
RegOpenKeyA
ControlService
OpenSCManagerA
QueryServiceStatus
StartServiceA
CreateServiceA
RegQueryValueExA
CloseServiceHandle
OpenServiceA
SetNamedSecurityInfoA
LookupPrivilegeValueA
BuildExplicitAccessWithNameA
AdjustTokenPrivileges
GetNamedSecurityInfoA
OpenProcessToken
shell32
ShellExecuteA
shlwapi
SHDeleteKeyA
SHSetValueA
SHGetValueA
PathFileExistsA
SHDeleteValueA
psapi
GetModuleFileNameExA
msvcrt
_except_handler3
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
strtoul
strrchr
_access
strstr
memset
memcpy
Exports
Exports
CoCreateInstance
CoGetMalloc
CoInitializeEx
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
GradientFill
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ