D:\我的文档\PE\NetGeter\Release\NetGeter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3939b670ec755f4338aeda4b7489fdd6_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3939b670ec755f4338aeda4b7489fdd6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3939b670ec755f4338aeda4b7489fdd6_JaffaCakes118
-
Size
89KB
-
MD5
3939b670ec755f4338aeda4b7489fdd6
-
SHA1
5af3cf99c7ec049edd03ea66bacdeb271ff96c30
-
SHA256
ca0b42cb4b774008febeb9992aabd50dc6d86ba44cc2bdbc46020269fb39cc63
-
SHA512
9dd55613c8563f299974d4e1dbe0129fa2ee6ebda481455637abcefba57f887eed033acd300bee29f333d2f7bb8d16a95bae0994bcd8af5eb2777154dae43591
-
SSDEEP
1536:NRORgfqqyybuZAvfy2i5GNLM4dDBCjajlL8aTPTCQGe2E/UEpw9LPbuyeY0:3ORgfqqyybuavFQCLMoiajlLdTPTGe2q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3939b670ec755f4338aeda4b7489fdd6_JaffaCakes118
Files
-
3939b670ec755f4338aeda4b7489fdd6_JaffaCakes118.exe windows:5 windows x86 arch:x86
44a14bb502f828ae1cdc84a86c7b0a75
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessA
CreateFileA
SetFilePointer
ReadFile
WriteFile
GetModuleFileNameW
CreateFileW
GetFileSize
GetVolumeInformationW
lstrcatW
CreateMutexW
GetLastError
WaitForSingleObject
GetModuleFileNameA
lstrcatA
OpenProcess
lstrcpyA
CloseHandle
GetCurrentProcess
MoveFileExW
InterlockedDecrement
FlushFileBuffers
GetStringTypeW
LCMapStringW
WriteConsoleW
SetStdHandle
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
LoadLibraryW
EnterCriticalSection
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
LocalFree
HeapFree
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
EncodePointer
DecodePointer
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
IsProcessorFeaturePresent
GetProcAddress
GetModuleHandleW
ExitProcess
GetStdHandle
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
Sleep
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
LeaveCriticalSection
user32
LoadStringW
wsprintfA
advapi32
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
ole32
CoCreateInstance
CoInitialize
CoUninitialize
CLSIDFromProgID
oleaut32
SysAllocString
GetErrorInfo
SysAllocStringByteLen
VariantClear
VariantCopy
VariantInit
SysFreeString
SysStringByteLen
psapi
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
urlmon
URLDownloadToFileA
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ