D:\new2DNet\Rocket\Product\Rocket.pdb
Static task
static1
Behavioral task
behavioral1
Sample
41d2c48b5742b94f161b235238934bce_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41d2c48b5742b94f161b235238934bce_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41d2c48b5742b94f161b235238934bce_JaffaCakes118
-
Size
45KB
-
MD5
41d2c48b5742b94f161b235238934bce
-
SHA1
fcdb17c6e58f8553fea81f778f33f38cb1ef28b1
-
SHA256
338c5193e7adf76a03e94684c54233cdf70bba972f63a62b15b0be02e7f431ee
-
SHA512
87230e2999270db7900b58f84fca8004e63ea4027bfa20aba16e4ffc9dc8b4b7cf5edf4f1eb12b5b82f778ae803eb35c5b74b0bd08114c8f71171dbe8a8d1818
-
SSDEEP
768:8MlPw5RQj4YcpcV7pVzlX2m9lSPmH9aHTnMei/sP9089PzFDYi:d4UjucV7DuPJHTnBiWf9rF0i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41d2c48b5742b94f161b235238934bce_JaffaCakes118
Files
-
41d2c48b5742b94f161b235238934bce_JaffaCakes118.exe windows:5 windows x86 arch:x86
a4a32ce57865f4a28be118ffa0a0603a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcessHeap
GetCommandLineA
OpenProcess
TerminateThread
Sleep
CreateEventA
GetSystemDirectoryA
lstrcatA
MultiByteToWideChar
lstrcmpiA
GetProcAddress
CopyFileA
LoadLibraryA
Process32Next
SetNamedPipeHandleState
GetModuleFileNameA
lstrcmpiW
GetModuleHandleA
VirtualProtect
CreateToolhelp32Snapshot
DuplicateHandle
GetVersionExA
WaitForSingleObject
lstrcpyW
DeleteFileA
lstrcpyA
GetFileSize
FindResourceA
FreeResource
SetEndOfFile
FreeLibrary
LoadResource
GetSystemTimeAsFileTime
SizeofResource
CreateProcessA
LockResource
LocalFree
SetEvent
ExitThread
lstrlenW
OpenEventA
OutputDebugStringA
GetCurrentProcessId
GetSystemTime
CreateThread
Process32First
HeapFree
GetCurrentProcess
HeapAlloc
VirtualQuery
lstrlenA
lstrcmpA
ExitProcess
CloseHandle
DeviceIoControl
VirtualAlloc
GetLastError
ReadFile
WriteFile
VirtualFree
SetFilePointer
GetTempPathA
CreateFileA
user32
FindWindowA
PostMessageA
SendMessageA
wsprintfW
wsprintfA
advapi32
AdjustTokenPrivileges
ControlService
OpenSCManagerA
QueryServiceStatus
LookupPrivilegeValueA
StartServiceA
CreateServiceA
RegQueryValueExA
OpenProcessToken
CloseServiceHandle
OpenServiceA
RegCloseKey
SetEntriesInAclA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
RegOpenKeyA
shell32
ShellExecuteA
shlwapi
SHDeleteKeyA
SHSetValueA
SHGetValueA
PathFileExistsA
SHDeleteValueA
psapi
GetModuleInformation
GetModuleFileNameExA
msvcrt
_except_handler3
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
strtoul
strrchr
_access
strstr
_wcsicmp
memset
memcpy
Exports
Exports
CoCreateInstance
CoGetMalloc
CoInitializeEx
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
GradientFill
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ