c:\Documents and Settings\Mike\Desktop\Cycnis\Cycnis\Zer0xreMod+timeout\Debug\Zer0xMod.pdb
Static task
static1
Behavioral task
behavioral1
Sample
381c7693f5e2b12df03cc41ab72d42b5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
381c7693f5e2b12df03cc41ab72d42b5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
381c7693f5e2b12df03cc41ab72d42b5_JaffaCakes118
-
Size
452KB
-
MD5
381c7693f5e2b12df03cc41ab72d42b5
-
SHA1
983a47fe5e06066dc738a85d2df5bd786e4bafde
-
SHA256
14464fc7050229cb8b23d2f1f6ec171e1bf7c59889f62dcdf3728b38ed558a4d
-
SHA512
f735a5b4db955dcf0d1c9a3573b0fb541801e72564e238cea605d1c9c989df55a12b74b108cbcfed6bc78c92023e584b21d1cb1e4dc93a3a893f48d319de5a6c
-
SSDEEP
6144:iiAZB7U30v86bu+SworANSYd31lx0otMsdEVqR8+RKOBVN9KGGiZE:i1oEvi+S/WSYdllx0k5SVqR87qVu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 381c7693f5e2b12df03cc41ab72d42b5_JaffaCakes118
Files
-
381c7693f5e2b12df03cc41ab72d42b5_JaffaCakes118.exe windows:5 windows x86 arch:x86
a88f0ec6489abbe6a7229c49932c03c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesA
lstrcmpiA
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
ExitProcess
CloseHandle
WriteFile
CreateFileA
GetTempPathA
GetTickCount
ExitThread
GetLocaleInfoA
SetFileAttributesA
TerminateThread
WaitForSingleObject
CreateThread
GetProcAddress
LoadLibraryA
DeleteFileA
CreateDirectoryA
GetDriveTypeA
GetLogicalDriveStringsA
CreateProcessA
ExpandEnvironmentStringsA
CreateMutexA
SetErrorMode
CopyFileA
GetLastError
GetVersionExA
Sleep
CompareStringW
CompareStringA
GetTimeZoneInformation
FlushFileBuffers
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
InterlockedExchange
RtlUnwind
VirtualAlloc
IsDebuggerPresent
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
HeapValidate
IsBadReadPtr
HeapFree
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
QueryPerformanceCounter
GetCurrentProcessId
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
SetFilePointer
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
FatalAppExitA
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryW
HeapSize
HeapReAlloc
SetEnvironmentVariableA
advapi32
RegSetValueExA
RegCloseKey
RegCreateKeyExA
shell32
ShellExecuteA
ws2_32
ioctlsocket
getsockname
inet_addr
gethostbyname
sendto
closesocket
select
send
htons
socket
connect
WSAStartup
WSACleanup
recv
shlwapi
PathRemoveFileSpecA
urlmon
URLDownloadToFileA
Sections
.textbss Size: - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 370KB - Virtual size: 369KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ