C:\B4\Actually\snappy\soldiers\spe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
53859b74ab0ed0e98065982462f4e575_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
53859b74ab0ed0e98065982462f4e575_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53859b74ab0ed0e98065982462f4e575_JaffaCakes118
-
Size
166KB
-
MD5
53859b74ab0ed0e98065982462f4e575
-
SHA1
8051b7fdaab086446f042e38ba8441f7ef7f79bf
-
SHA256
f661b07bd3423169515100a692447124fb05615f4488fd22247c23aadc8ab14b
-
SHA512
8965808b61ba4e9e1ec85633f553db699a5941bda80bde4af8321dcd7abe72259dd231667f7f816377814dd76d4e1de9aba3b324459d0d1948169f9ecfe78430
-
SSDEEP
3072:OVd6xqrZIUUA8mqQc5haomJzBV9ZFGhSYEUcnB:OVQUr1SQUdmpK5iB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53859b74ab0ed0e98065982462f4e575_JaffaCakes118
Files
-
53859b74ab0ed0e98065982462f4e575_JaffaCakes118.exe windows:5 windows x86 arch:x86
31c487297075fe44715e85b274384ee3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetStdHandle
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ReadFile
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
WriteConsoleA
InitializeCriticalSectionAndSpinCount
RtlUnwind
IsDebuggerPresent
lstrcpyA
TerminateProcess
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetLastError
FreeLibrary
OutputDebugStringA
GetVersionExA
GlobalMemoryStatusEx
GetCurrentProcess
_lopen
HeapCreate
MulDiv
HeapAlloc
ExitProcess
SetLastError
lstrcmpiA
lstrlenA
CloseHandle
GetModuleHandleA
TlsGetValue
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LoadLibraryA
GetModuleFileNameA
GetStdHandle
WriteFile
Sleep
GetModuleHandleW
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
GetProcAddress
GetStartupInfoA
HeapFree
GetCommandLineA
user32
GetSubMenu
LoadMenuA
SetForegroundWindow
GetWindowTextA
GetIconInfo
GetCursorInfo
DestroyMenu
EnableMenuItem
TrackPopupMenu
GetCursorPos
PostMessageA
DefWindowProcA
PostQuitMessage
GetClassNameA
SetRect
DrawTextA
CreateMenu
CreatePopupMenu
SetMenu
SetCapture
InvalidateRect
GetCapture
BeginPaint
EndPaint
SetWindowTextA
GetClientRect
CreateWindowExA
DestroyWindow
wsprintfA
SetLayeredWindowAttributes
InsertMenuItemA
TrackPopupMenuEx
LoadImageA
LoadIconA
GetSystemMetrics
GetWindowRect
MoveWindow
SetWindowPos
GetMessageA
TranslateMessage
DispatchMessageA
GetDlgItem
GetWindowPlacement
SetWindowPlacement
IsDlgButtonChecked
GetDlgItemTextA
GetDC
gdi32
GetObjectA
DeleteDC
DeleteObject
StartDocA
StartPage
Rectangle
MoveToEx
SetMapMode
CreateFontIndirectA
GetDeviceCaps
CreateCompatibleBitmap
BitBlt
EnumFontsA
GetClipBox
CreateCompatibleDC
SaveDC
SelectObject
comdlg32
GetOpenFileNameA
advapi32
OpenProcessToken
RegCloseKey
ole32
CoInitializeEx
psapi
GetPerformanceInfo
EnumProcesses
GetModuleFileNameExA
msimg32
TransparentBlt
shlwapi
PathFindFileNameA
comctl32
InitCommonControlsEx
gdiplus
GdipAlloc
GdipCreatePen1
GdipDeletePen
GdipDeleteGraphics
GdipFree
GdipCreateBitmapFromGraphics
GdipCreateFromHDC
GdipGetImageGraphicsContext
GdipDrawLine
GdipCloneImage
GdipDisposeImage
wtsapi32
WTSEnumerateProcessesA
WTSFreeMemory
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.guid Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ