f:\Programmieren\Codesoft Releases\Infinity_Binder_v2.5\Boodah Version\stub\Release\stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3b0f807cf3508bc3fbd461ef66a558a6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b0f807cf3508bc3fbd461ef66a558a6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3b0f807cf3508bc3fbd461ef66a558a6_JaffaCakes118
-
Size
625KB
-
MD5
3b0f807cf3508bc3fbd461ef66a558a6
-
SHA1
e4ca369b3604e7ec3c01817c8c75bf39ac01805c
-
SHA256
e8adceac9a39c457cbf536cdb756afa6fadbc3a3301377d768a9074e2a0dc019
-
SHA512
f1ea7e4c77fba6f8f91810f8bfa94025ad6035c9e69ecfe11b6c251dd9a7b16dbc39af637ce05f4e704657b75b0287615f70df4cd034381b96f0a071e23676dc
-
SSDEEP
6144:I7kvUwPwR3xdAho6Odo8eSEsQMvTFZ+70HByT:I7mP8Ao6oo8+MvHg0HkT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b0f807cf3508bc3fbd461ef66a558a6_JaffaCakes118
Files
-
3b0f807cf3508bc3fbd461ef66a558a6_JaffaCakes118.exe windows:4 windows x86 arch:x86
86d6c93ef34b6bdef2f6c1a522369a81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateToolhelp32Snapshot
GetEnvironmentVariableA
lstrcatA
lstrcpyA
GetShortPathNameA
Sleep
GetModuleHandleA
GetCurrentDirectoryA
GetWindowsDirectoryA
GetSystemDirectoryA
GetModuleFileNameA
Process32First
Module32First
Module32Next
GetTempPathA
Process32Next
SetEndOfFile
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
ExitProcess
HeapFree
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
GetLastError
LCMapStringW
GetCPInfo
VirtualQuery
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
WriteFile
FlushFileBuffers
SetFilePointer
CloseHandle
ReadFile
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetLocaleInfoA
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
HeapSize
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
LoadLibraryA
SetStdHandle
CreateFileA
GetLocaleInfoW
user32
wsprintfA
advapi32
RegSetValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
shell32
ShellExecuteA
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ