C:\fimog.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8bef47b423bc1318ad88f0d239717e26_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8bef47b423bc1318ad88f0d239717e26_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8bef47b423bc1318ad88f0d239717e26_JaffaCakes118
-
Size
11.6MB
-
MD5
8bef47b423bc1318ad88f0d239717e26
-
SHA1
f6015b826634751b01f561540a034b7e8bccc46d
-
SHA256
93f3712dbebaafe28d0c52837e64ebdff4faf292f1a6b75abb885cb6e719753f
-
SHA512
5c885dd3f1228ec73330d516f35dbb352caddf0c0ebe57fc9d21324293f1fc933358940fe38e83fab480a62713c6d11d98f3bb92a82ceb65599e6260b8e919f6
-
SSDEEP
49152:ipWkhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhN:ipW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 8bef47b423bc1318ad88f0d239717e26_JaffaCakes118
Files
-
8bef47b423bc1318ad88f0d239717e26_JaffaCakes118.exe windows:5 windows x86 arch:x86
9b9bd39fbbbaa14f8125d18d2eb160d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenW
CreatePipe
GetCompressedFileSizeW
LocalAlloc
lstrcatW
CloseHandle
LoadLibraryW
GetCurrencyFormatW
VirtualProtect
ExitProcess
FormatMessageA
CreateFileW
HeapReAlloc
HeapSize
DecodePointer
SetHandleInformation
GetProcAddress
ReadFile
WriteConsoleW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RtlUnwind
GetModuleHandleExW
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetACP
HeapFree
HeapAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetFileType
GetStringTypeW
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
RaiseException
user32
GetWindowWord
GetMenu
WindowFromPoint
GetPropA
SetWindowContextHelpId
gdi32
SetTextJustification
SetViewportOrgEx
winspool.drv
DeviceCapabilitiesW
ole32
CoIsOle1Class
ProgIDFromCLSID
winhttp
WinHttpCloseHandle
WinHttpAddRequestHeaders
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpGetDefaultProxyConfiguration
msimg32
TransparentBlt
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 55KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11.5MB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ