E:\Organizacion\Proyectos\Activos\microdropper\microdropper\Release\microdropper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2a630875dba12649bba9c75b14b22ec8_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
2a630875dba12649bba9c75b14b22ec8_JaffaCakes118
-
Size
348KB
-
MD5
2a630875dba12649bba9c75b14b22ec8
-
SHA1
d021ef443bee4a7c84baf123692f820fa8f4f7e1
-
SHA256
555ef2d263e0a0b6455d2aa88892fb24248dcd3b04db1de2f0a2fa3d616f2e07
-
SHA512
9d67e9032b494b9587cd8211dbd058729abb05017e52dfd1117f4a4d027890a2108b56e31928ee8372c45a079b120b1e4d8fc4d8c5bcda4be1577ac333a284f5
-
SSDEEP
6144:WLPXVSPapJNHJrmoq7tPW7spHWtksBTgtQEgO2qNEKwSd+3/twI8s6r:kXVSjPW7C2aATg9gUNlF+31j8Hr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a630875dba12649bba9c75b14b22ec8_JaffaCakes118
Files
-
2a630875dba12649bba9c75b14b22ec8_JaffaCakes118.exe windows:5 windows x86 arch:x86
5916def5adc563723e9c183842efa3ac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadFile
GetCommandLineW
CreateFileW
MultiByteToWideChar
CreateProcessW
CloseHandle
WideCharToMultiByte
Sleep
GetTempPathW
GetTempFileNameW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
SetEnvironmentVariableA
CompareStringW
GetSystemTimeAsFileTime
HeapAlloc
GetLastError
HeapFree
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
GetTimeZoneInformation
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
LoadLibraryW
RtlUnwind
GetACP
GetOEMCP
IsValidCodePage
IsProcessorFeaturePresent
HeapReAlloc
LCMapStringW
GetStringTypeW
HeapSize
user32
FindWindowW
SendMessageW
shell32
CommandLineToArgvW
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ