k:\Programmieren\Codesoft Releases\Beta Hardware-ID\Crypter\Timo Version\stub_patch\Release\Aholic Stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3776040fccfe0be61e9502f0c83973f7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3776040fccfe0be61e9502f0c83973f7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3776040fccfe0be61e9502f0c83973f7_JaffaCakes118
-
Size
285KB
-
MD5
3776040fccfe0be61e9502f0c83973f7
-
SHA1
27980d071157190cef4703f387d08d09b7de20e2
-
SHA256
62416b6b5f041ff2d5e3dbc27363b5bfd62e9e2da28553c18ad80916a12be542
-
SHA512
afb6ffa3cd70b420be2b12b6732888d6f07699af41172f16490a8c31b0357a7bc8867e38be0a1057ca4b433b37dd53ed78913061b09f27169d810bf4fbaf70f7
-
SSDEEP
3072:ryoaTPj1rKTJ7ZwUFqe8S7Ltpk5sIxmPhH4MuajcF:WoaTbFKTJ7ZwmZRQuhH4MJjcF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3776040fccfe0be61e9502f0c83973f7_JaffaCakes118
Files
-
3776040fccfe0be61e9502f0c83973f7_JaffaCakes118.exe windows:4 windows x86 arch:x86
45be315f72ff95d267715088de267873
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
lstrcatA
GetTempPathA
Process32Next
Module32Next
lstrlenA
Process32First
GetModuleFileNameA
GetModuleHandleA
CreateToolhelp32Snapshot
Module32First
lstrcpyA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
VirtualQuery
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
GetLocaleInfoW
CreateFileW
SetEndOfFile
user32
wsprintfA
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ