d:\Works\ByShell_Up19\WinStart\Release\WinStart.pdb
Static task
static1
Behavioral task
behavioral1
Sample
40ac97aef238d15e6ab778a4c2020394_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40ac97aef238d15e6ab778a4c2020394_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40ac97aef238d15e6ab778a4c2020394_JaffaCakes118
-
Size
205KB
-
MD5
40ac97aef238d15e6ab778a4c2020394
-
SHA1
72824a8181bcf97c2357f6e26288009d3c064c66
-
SHA256
0e4e16f9c5d436b9b3a1f4988c43e6a3073822300669f5a38c03ac31e038ab2f
-
SHA512
7d31ebd90a4fefa44ceb2b327f316393120c6d5e3fa8bd33a45ac2e7f42166b6879f166005a74b72ae03431f4a251d1edede3f19341913c45aec50070d866a0b
-
SSDEEP
3072:Eq/9pQGqVlRStBMYiuaTyI1lTL0FpKyKpbe2if5lAZxS:h9pvqxStcph1NLO0yQSmZ4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40ac97aef238d15e6ab778a4c2020394_JaffaCakes118
Files
-
40ac97aef238d15e6ab778a4c2020394_JaffaCakes118.exe windows:4 windows x86 arch:x86
c88fa953023734f7156c298cb28cc4c2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LockResource
GlobalAlloc
LoadResource
SizeofResource
FindResourceW
GetSystemDirectoryA
ResumeThread
CreateProcessW
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatW
lstrcpyW
GetEnvironmentVariableW
GetShortPathNameW
GetModuleFileNameW
CreateFileA
FindResourceA
SetFilePointer
OutputDebugStringA
GetTimeFormatA
GetLocalTime
SetCurrentDirectoryA
DeleteFileA
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
Sleep
CopyFileA
GetModuleFileNameA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetSystemInfo
VirtualProtect
SetEndOfFile
GetCPInfo
GetOEMCP
GetStringTypeW
CreateFileW
WriteFile
GlobalFree
GetCurrentProcess
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetLocaleInfoA
GetACP
GetVersionExA
LoadLibraryA
GetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
GetTickCount
ExitProcess
RtlUnwind
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualQuery
ReadFile
TerminateProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetStdHandle
FlushFileBuffers
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
InterlockedExchange
user32
RegisterClassExW
CreateWindowExW
ShowWindow
UpdateWindow
DefWindowProcW
advapi32
RegRestoreKeyA
RegCreateKeyA
RegOpenKeyExA
RegSaveKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ