u:\@rab@\My Documents\C++Projects\Usb_stuff\BootFlashDos\Release\BootFlashDos.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4454b5e2bcc641187dbe6c4a1d364492_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4454b5e2bcc641187dbe6c4a1d364492_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4454b5e2bcc641187dbe6c4a1d364492_JaffaCakes118
-
Size
148KB
-
MD5
4454b5e2bcc641187dbe6c4a1d364492
-
SHA1
1bc1a923a6c64e292c6b64bc143100adfebf23da
-
SHA256
7013ce859bc99659f50cc7ba2eb9fde9cb4af9ff5272a9c70363192d75e38e5e
-
SHA512
c40f9b070db7fd3c9863fb489e87ea3747588add9ce29ca7c9b7d40de435108029a6478ffe1a4f095dac4c97bd2f9355738cfb99d2cb3a071496cdd25ecc352c
-
SSDEEP
1536:TUcWTl6pU6QVHMYJuqdlR4PmeaLJPbwRRNRRglQhDK1e2:TUTt3VPdlbeaLJwG1e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4454b5e2bcc641187dbe6c4a1d364492_JaffaCakes118
Files
-
4454b5e2bcc641187dbe6c4a1d364492_JaffaCakes118.exe windows:4 windows x86 arch:x86
192b8a00c3ab0a079a4d72676d130a7d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadFile
GetModuleFileNameA
GetSystemDirectoryA
CreateFileA
Sleep
DeviceIoControl
GetModuleHandleA
GlobalUnlock
GlobalLock
GlobalSize
GlobalFree
GlobalAlloc
FreeLibrary
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceA
LoadLibraryA
GetLogicalDrives
GetLastError
SetVolumeMountPointA
GetVolumeNameForVolumeMountPointA
CloseHandle
QueryDosDeviceA
SetLastError
InitializeCriticalSection
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
GetLogicalDriveStringsA
LCMapStringW
LCMapStringA
HeapSize
SetStdHandle
GetSystemInfo
VirtualProtect
GetLocaleInfoA
HeapReAlloc
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
HeapAlloc
FlushFileBuffers
GetStringTypeW
SetFilePointer
WriteFile
DefineDosDeviceA
GetVolumeInformationA
GetStringTypeA
VirtualQuery
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
InterlockedExchange
user32
EndDialog
LoadIconA
SendMessageA
LoadCursorA
SetClassLongA
wsprintfA
GetDlgItemTextA
GetDlgItem
EnableWindow
SetDlgItemTextA
UpdateWindow
IsDlgButtonChecked
SendDlgItemMessageA
MessageBoxA
DialogBoxParamA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE