D:\smartloader\kernel_proj\trunk\kernel_smartloader\bin\ReleaseA\pdb\KernelSmartLoader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
44c9b7c3b78b31aeca7a35e9403258ff_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
44c9b7c3b78b31aeca7a35e9403258ff_JaffaCakes118
-
Size
121KB
-
MD5
44c9b7c3b78b31aeca7a35e9403258ff
-
SHA1
3152d766a5d670957d08f9d54438f4bfd821e38d
-
SHA256
0bd407435f447278fdbdcba8f7b65a919e26386b3dc5ab8b24e271561da583a2
-
SHA512
14e9f7ee49cd3fe0d95488e19b2902b7554676e366afc1343eba95f86c21b1b4267e6ae52b81a48103974f790aab6db4b65530bf2eca1608529dfadb88a38308
-
SSDEEP
3072:waubO4/S9L30ouZ5mzwasUCLZoLOq+HJ5QSCYn:PubO4030ouZ454mDSX1n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44c9b7c3b78b31aeca7a35e9403258ff_JaffaCakes118
Files
-
44c9b7c3b78b31aeca7a35e9403258ff_JaffaCakes118.exe windows:4 windows x86 arch:x86
4197393cb718e6ca6abe559849b4334d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameA
GetPrivateProfileIntA
CreateProcessA
OutputDebugStringA
CreateToolhelp32Snapshot
Process32First
Module32First
GetProcAddress
Module32Next
LoadLibraryA
FreeLibrary
Process32Next
GetCurrentProcess
GetFileAttributesA
ReadFile
FileTimeToSystemTime
GetPrivateProfileStringA
SetEndOfFile
CreateDirectoryA
GetVersionExA
CopyFileA
GetProcessTimes
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
WriteFile
GetModuleHandleA
SetFilePointer
CloseHandle
CreateFileA
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
GetMessageA
DestroyAcceleratorTable
CreateAcceleratorTableA
TranslateMessage
DispatchMessageA
TranslateAcceleratorA
shell32
SHGetSpecialFolderPathA
ole32
CoUninitialize
CoInitialize
msvcp80
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@V?$_String_const_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@0@Z
msvcr80
_exit
memset
??3@YAXPAX@Z
_chmod
_mbsnbcpy_s
_unlink
strcat_s
_mbsrchr
_invalid_parameter_noinfo
_localtime64
_time64
_access
strftime
_getpid
atol
_snprintf_s
_vsnprintf_s
_mbschr
strcpy_s
_stricmp
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
__CxxFrameHandler3
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_crt_debugger_hook
_invoke_watson
_controlfp_s
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE