C:\Users\Izidu\Desktop\2019\WindowsSDK7-Samples-master\WindowsSDK7-Samples-master\com\uac\elevationsample\Release\ElevationSample.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9071660cee4c6bdc30aecdbf6c742f0dae9bee34e34ccfa135186c01fcbe77e8.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_ff97a53dfcd64583ea1417ae79f60676f7ebd904ba2894f4e3ac4952b1cc4d12
-
Size
83KB
-
MD5
1e3bcc8969fe6db9fabf191e7c7a48fd
-
SHA1
953d2251e6d796d3e89a9d1945a8b8b1c998e343
-
SHA256
ff97a53dfcd64583ea1417ae79f60676f7ebd904ba2894f4e3ac4952b1cc4d12
-
SHA512
ce932d211132c5d0e6a5e5f5aa8c80203c2e93fb060c4f958c1f4dda7b04dc1c165434dcd928086bfa45dc4b6795520bd39f2e98aa6a235ae7de11ce30e68073
-
SSDEEP
1536:bwo0eD+jNZ7wP8SXuF4URcbGFuIQoYYrf5pQSGHhf+X8btbLQyWZO3/q:coBD8RwuybiDhYYxGHJ/btfyAPq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9071660cee4c6bdc30aecdbf6c742f0dae9bee34e34ccfa135186c01fcbe77e8
Files
-
JaffaCakes118_ff97a53dfcd64583ea1417ae79f60676f7ebd904ba2894f4e3ac4952b1cc4d12.zip
Password: infected
-
9071660cee4c6bdc30aecdbf6c742f0dae9bee34e34ccfa135186c01fcbe77e8.exe windows:6 windows x86 arch:x86
f021b8a0f6cd2b800a3f854afc681ee1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FormatMessageW
LocalFree
CreateFileW
CloseHandle
DecodePointer
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
VirtualAllocExNuma
LCMapStringW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetLastError
GetCurrentProcess
GetProcessHeap
GetFullPathNameW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
RaiseException
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
WriteConsoleW
user32
DestroyWindow
SendMessageW
LoadStringW
LoadAcceleratorsW
GetMessageW
PostMessageW
EndPaint
BeginPaint
DefWindowProcW
PostQuitMessage
GetDlgItem
GetWindowRect
SetWindowPos
CreateDialogParamW
IsDialogMessageW
MessageBoxW
GetWindowTextW
SetWindowTextW
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
gdi32
CreateSolidBrush
comdlg32
GetOpenFileNameW
ole32
CoInitializeEx
CoUninitialize
StringFromGUID2
CoGetObject
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
Exports
Exports
OOAFGDAWSADWFDD
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ