e:\Users\Parth\Documents\Visual Studio 2005\Projects\vsafe\release\vsafe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
113ce65c2fe922d8ed48f107c96ba230_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
113ce65c2fe922d8ed48f107c96ba230_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
113ce65c2fe922d8ed48f107c96ba230_JaffaCakes118
-
Size
140KB
-
MD5
113ce65c2fe922d8ed48f107c96ba230
-
SHA1
1d109f5c6c44a1b37259814f0b4b9003cdc8ced3
-
SHA256
3ef634d472144a7545e122426b68be1a7c251bf34f0458ed61aaa04d8db13f0d
-
SHA512
44f672cb7a8f1afed5b47fbd8f6803e464514b1727f8260df7f5cdc0c8f9a7a69555adb8bcae092de208064387be572f51c4133135dbe64a968d2ccd1a629d49
-
SSDEEP
768:laW+I7w5XXAih4UQT7mGJAGOGlGln+V+lhWVNER7BZU9qZU9Q:laNI7wBArUQPmGJAGOGlGln+V+OYlBpT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 113ce65c2fe922d8ed48f107c96ba230_JaffaCakes118
Files
-
113ce65c2fe922d8ed48f107c96ba230_JaffaCakes118.exe windows:4 windows x86 arch:x86
d47a8edc5005a437b7b1c63f702887f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetFileAttributesW
DeleteFileW
WriteFile
CreateDirectoryW
CopyFileW
GetCurrentProcess
GetSystemDirectoryW
FindFirstVolumeW
GetVolumePathNamesForVolumeNameW
GetDriveTypeW
FindNextVolumeW
FindVolumeClose
Sleep
SetErrorMode
CreateMutexW
WaitForSingleObject
CreateThread
GetLastError
GetComputerNameW
GetSystemTime
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
TerminateProcess
Process32NextW
Module32FirstW
ReleaseMutex
GlobalAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
CloseHandle
HeapFree
GetFileSize
CreateFileW
GetModuleFileNameW
ReadFile
HeapCreate
SetFilePointer
HeapAlloc
ResumeThread
UnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
user32
GetKeyNameTextW
GetAsyncKeyState
GetKeyState
MapVirtualKeyW
CharLowerW
advapi32
RegOpenKeyExW
RegCloseKey
RegSetValueExW
LookupPrivilegeValueW
SetKernelObjectSecurity
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
OpenProcessToken
shell32
ShellExecuteW
msvcr80
_vsnwprintf_s
rand_s
_wfopen
perror
fprintf
fflush
_wcsicmp
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
wcscat_s
wcscpy_s
memset
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE