E:\CVS checkout\PS Dev\psdev-partners-\Common\CampaignEmulator\Release\CampaignEmulator.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1699c0dcdf8e3ef8e77c3bc44a0bf77b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1699c0dcdf8e3ef8e77c3bc44a0bf77b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1699c0dcdf8e3ef8e77c3bc44a0bf77b_JaffaCakes118
-
Size
283KB
-
MD5
1699c0dcdf8e3ef8e77c3bc44a0bf77b
-
SHA1
eabd3287891d4b71450d3559a9666e21c8633c87
-
SHA256
0a5d0f5c8c356405be90b9b3b0eaee9175fde530e4a71b6ff3933ea36a0ad89c
-
SHA512
1aed762c9b4e8598121f2f8ebf171d2374596898df3c84bebed2fe2fe12e5e804336749bf5df2ac4b5b7eed4c151e5240e65a217cdfa7f4421c44b7c3cb09007
-
SSDEEP
6144:B6oiTvKximRGo+mQNFXjga975nQM0MzgijVs9R04GU:BhRGo0ca975nQcgUmr07U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1699c0dcdf8e3ef8e77c3bc44a0bf77b_JaffaCakes118
Files
-
1699c0dcdf8e3ef8e77c3bc44a0bf77b_JaffaCakes118.exe windows:5 windows x86 arch:x86
4c74220500d57a223c0f553d5b198d0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LocalFree
lstrlenA
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
WriteConsoleW
SetStdHandle
LoadLibraryW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetTimeZoneInformation
FlushFileBuffers
CloseHandle
GetModuleFileNameA
SetLastError
GetModuleHandleA
Sleep
GetTempPathA
GetLastError
FormatMessageA
GetConsoleMode
GetConsoleCP
WriteFile
SetFilePointer
ReadFile
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
ExitProcess
HeapSize
GetLocaleInfoW
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
EncodePointer
DecodePointer
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
HeapFree
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
ExitThread
GetCurrentThreadId
CreateThread
HeapAlloc
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
HeapCreate
user32
ClientToScreen
DestroyWindow
SetCursor
GetMessageA
GetWindowRect
PostQuitMessage
SetCapture
GetDC
TranslateMessage
SystemParametersInfoW
CreateWindowExA
DefWindowProcA
SetLayeredWindowAttributes
ShowWindow
PostMessageA
DispatchMessageA
ReleaseCapture
UpdateWindow
LoadCursorA
MoveWindow
RegisterClassExA
gdi32
GetStockObject
CreateSolidBrush
SetDIBitsToDevice
SetBkMode
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
ole32
CoInitialize
OleRun
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
VariantClear
rpcrt4
RpcStringFreeA
UuidCreate
UuidToStringA
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ