c:\WS\Client\Builds\Runner\1.0.0.0\Release\Runner.pdb
Static task
static1
Behavioral task
behavioral1
Sample
41eb56db29d6b6a8a0549890b4c2df60_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41eb56db29d6b6a8a0549890b4c2df60_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41eb56db29d6b6a8a0549890b4c2df60_JaffaCakes118
-
Size
623KB
-
MD5
41eb56db29d6b6a8a0549890b4c2df60
-
SHA1
feb52772de3899c2c8d905e46994e79ca6abc360
-
SHA256
b587622e08ea47546729ebbb94ba7cfceee5d144b3c79c675176e3e080c951a5
-
SHA512
ca4a6ccdeb8a2232862f6acd0f767bd78236d7ccf70613d3e14c112984668094bc0125304e6c3d35b23386ee54dc3f3e2c44cb8ad190faf8b15e4f8bbc25e969
-
SSDEEP
12288:oXSKFXJHfHTj9rq1cx57A3Q1j11pd12gtr:OvH/9rAcx57J1j1n2gtr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41eb56db29d6b6a8a0549890b4c2df60_JaffaCakes118
Files
-
41eb56db29d6b6a8a0549890b4c2df60_JaffaCakes118.exe windows:4 windows x86 arch:x86
8e3cc97222246d30530af8e9795a4c26
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
lstrlenW
lstrlenA
ReadFile
WideCharToMultiByte
CreateFileA
GetModuleFileNameA
CloseHandle
GetFileSize
SetFilePointer
GetTempPathA
Sleep
GetCurrentProcessId
WaitForSingleObject
DeleteFileA
GetTickCount
GetCommandLineA
MultiByteToWideChar
WriteFile
InterlockedExchange
SetEndOfFile
CreateFileW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
CreateThread
TerminateThread
GetVersionExA
GetCurrentProcess
GetProcAddress
GetModuleHandleA
ExpandEnvironmentStringsW
FreeLibrary
LoadLibraryA
InterlockedDecrement
GlobalAlloc
GetMailslotInfo
CreateMailslotA
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetACP
GetLocaleInfoA
GetThreadLocale
HeapAlloc
HeapFree
RaiseException
HeapReAlloc
VirtualAlloc
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcessHeap
GetStartupInfoA
ExitProcess
GetCPInfo
LCMapStringA
LCMapStringW
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
HeapSize
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsA
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
ShellExecuteA
user32
UpdateWindow
DefWindowProcA
PostQuitMessage
ShowWindow
DispatchMessageA
TranslateMessage
CreateWindowExA
RegisterClassA
PostMessageA
GetSystemMetrics
GetMessageA
ole32
CLSIDFromString
CoCreateGuid
StringFromGUID2
oleaut32
SysFreeString
VariantClear
SysAllocString
ws2_32
gethostbyname
htonl
sensapi
IsNetworkAlive
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ