d:\Ryan Project\Anti-AntiVirus\AntiAntiVirus_command\bin\release\stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1135c95a6e7136b226edc2263eb8f574_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1135c95a6e7136b226edc2263eb8f574_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1135c95a6e7136b226edc2263eb8f574_JaffaCakes118
-
Size
664KB
-
MD5
1135c95a6e7136b226edc2263eb8f574
-
SHA1
995c25c17dfa9f004c03d2850aa7be9b6faeba07
-
SHA256
d8ba8ce11570dc7626cfff34557c79a94f2d99ac03c6f3a50d0856556e8c5e3b
-
SHA512
44689c3d242016ce1e2d45b75a50f09d9994f5cbacb209bf4aeb10b5cffeb8c09df9ad84cf64e4b521a414dd1a3cdbfed31b6a17c1cef710e34f0747844dac7c
-
SSDEEP
12288:GEHSqhi0BK2PweNnVnloAvSwoNeE5vj8UZMHl2L:3Phi0BK8weNnfou878fe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1135c95a6e7136b226edc2263eb8f574_JaffaCakes118
Files
-
1135c95a6e7136b226edc2263eb8f574_JaffaCakes118.exe windows:4 windows x86 arch:x86
3c1dc185aaba772ea4489026c53cedea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualProtectEx
VirtualAllocEx
WideCharToMultiByte
ReadProcessMemory
GetModuleFileNameA
WaitForSingleObject
GetCommandLineW
CreateProcessA
GetModuleHandleA
TerminateProcess
GetThreadContext
WriteProcessMemory
ResumeThread
OutputDebugStringW
VirtualQueryEx
SetThreadContext
GetProcAddress
VirtualAlloc
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetCurrentProcessId
shell32
CommandLineToArgvW
msvcr80
_cexit
_exit
__getmainargs
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_amsg_exit
??2@YAPAXI@Z
fseek
??3@YAXPAX@Z
fread
fopen
strchr
printf
memcpy
_XcptFilter
memset
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Smiley0 Size: 4KB - Virtual size: 792B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Smiley Size: 4KB - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
. Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE