E:\CVS checkout\PS Dev\psdev-partners-\Common\CampaignEmulator\Release\CampaignEmulator.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3f5f39f057288c3f5d1ed6a1fc71e668_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3f5f39f057288c3f5d1ed6a1fc71e668_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3f5f39f057288c3f5d1ed6a1fc71e668_JaffaCakes118
-
Size
283KB
-
MD5
3f5f39f057288c3f5d1ed6a1fc71e668
-
SHA1
1cbeed0bd87f1e20262dbe73fa9a6428201e07ca
-
SHA256
c3361a776ebf4089d85c660c52802af77b9fe64107aae1b927742d59a2ccb3a8
-
SHA512
e2ecdda8dbba930bc4237ae0ba785be90b69a8ec7ab1b2fbc59a06584cf8cb8c7bacb42852c80fa512ed1b0194b3e0e4c246b31c5e12749a37915abb827e20b2
-
SSDEEP
6144:R6k7UMhWs9tGPbmQDB0Iju6QJFlMW8d0+Em1:RFtGPJbu6QJFl34VR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f5f39f057288c3f5d1ed6a1fc71e668_JaffaCakes118
Files
-
3f5f39f057288c3f5d1ed6a1fc71e668_JaffaCakes118.exe windows:5 windows x86 arch:x86
4c74220500d57a223c0f553d5b198d0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LocalFree
lstrlenA
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
WriteConsoleW
SetStdHandle
LoadLibraryW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetTimeZoneInformation
FlushFileBuffers
CloseHandle
GetModuleFileNameA
SetLastError
GetModuleHandleA
Sleep
GetTempPathA
GetLastError
FormatMessageA
GetConsoleMode
GetConsoleCP
WriteFile
SetFilePointer
ReadFile
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
ExitProcess
HeapSize
GetLocaleInfoW
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
EncodePointer
DecodePointer
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
HeapFree
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
ExitThread
GetCurrentThreadId
CreateThread
HeapAlloc
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
HeapCreate
user32
ClientToScreen
DestroyWindow
SetCursor
GetMessageA
GetWindowRect
PostQuitMessage
SetCapture
GetDC
TranslateMessage
SystemParametersInfoW
CreateWindowExA
DefWindowProcA
SetLayeredWindowAttributes
ShowWindow
PostMessageA
DispatchMessageA
ReleaseCapture
UpdateWindow
LoadCursorA
MoveWindow
RegisterClassExA
gdi32
GetStockObject
CreateSolidBrush
SetDIBitsToDevice
SetBkMode
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
ole32
CoInitialize
OleRun
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
VariantClear
rpcrt4
RpcStringFreeA
UuidCreate
UuidToStringA
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ