C:\Users\gr\Desktop\crpr\base\7\stub\Release\stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_32211dee6a6c7e4850368408ab5ebc2a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_32211dee6a6c7e4850368408ab5ebc2a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_32211dee6a6c7e4850368408ab5ebc2a
-
Size
2.2MB
-
MD5
32211dee6a6c7e4850368408ab5ebc2a
-
SHA1
77125dae47e851d11a8865b7dbf3e4aeb6086342
-
SHA256
6e39e977c4fc8fe87ac857a349fdeaf40873cb296e46ca715a223fdf012b0143
-
SHA512
7acd8b95f5268cb780078d61216207e878182e89f600cd8c7eea9e8645244a96d533ce4425ac810319be5bd995d5aedcd47c89719abcef9a36131fd3227d3a5f
-
SSDEEP
12288:axYXuBiUvOTi2TJlDrnDrnDrnDrnJrlxtGfaIJ2Lk1VwtVr06Mv+vsBwSjfwD90e:WYG2TJljIJzozJzdbanoqKBXP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_32211dee6a6c7e4850368408ab5ebc2a
Files
-
JaffaCakes118_32211dee6a6c7e4850368408ab5ebc2a.exe windows:5 windows x86 arch:x86
435d6ace3166edf8bdca0abe427221c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileW
EncodePointer
DecodePointer
CreateThread
VirtualProtect
WriteConsoleW
SetFilePointerEx
HeapReAlloc
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetCurrentThread
OutputDebugStringA
OutputDebugStringW
CloseHandle
WaitForSingleObjectEx
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
GetProcessHeap
SetConsoleCtrlHandler
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
RaiseException
user32
MessageBoxA
CloseDesktop
AllowSetForegroundWindow
advapi32
IsValidSid
SystemFunction036
SetTokenInformation
SetThreadToken
SetSecurityInfo
SetKernelObjectSecurity
SetEntriesInAclW
FreeSid
GetAce
GetKernelObjectSecurity
GetLengthSid
GetNamedSecurityInfoW
GetSecurityDescriptorSacl
GetSecurityInfo
GetSidSubAuthority
GetTokenInformation
ImpersonateLoggedOnUser
ImpersonateNamedPipeClient
InitializeSid
LookupPrivilegeValueW
MapGenericMask
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegDisablePredefinedCache
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RevertToSelf
wininet
InternetCheckConnectionA
Sections
.text Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 558KB - Virtual size: 557KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 364B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ