MsMpEng.pdb
Static task
static1
Behavioral task
behavioral1
Sample
beceb15e1e355f07bfbf082ad078485f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
beceb15e1e355f07bfbf082ad078485f_JaffaCakes118
-
Size
1.5MB
-
MD5
beceb15e1e355f07bfbf082ad078485f
-
SHA1
97998e77d5388a62b90107dbdd5238937729126f
-
SHA256
8b86d6a7a5bbc371f796f46fd04ab4ae25b94ab3d2c08bd43dd4f9264f260c79
-
SHA512
0e82d8a6830b768ed975d5ba76ea3c85373db150a4ca3d65a328b4d502787093e74a04704d190a9d6aeb69093f9a28aedb42686ebdad365ebb5936a70fa74adf
-
SSDEEP
24576:VrP64/izRXTOkMtrIceMaFPjkjD29AlminozrP64/izRXTOkMtrIceMaFPjkjD2c:VryakOElMaFLkDoryakOElMaFLk7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource beceb15e1e355f07bfbf082ad078485f_JaffaCakes118
Files
-
beceb15e1e355f07bfbf082ad078485f_JaffaCakes118.exe windows:10 windows x64 arch:x64
d8eacf131a4cf2ca66b070e58c2e4554
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
TraceMessage
RegCloseKey
RegOpenKeyExW
EventWriteTransfer
EventUnregister
EventRegister
RegQueryValueExW
RegSetValueExW
kernel32
FlsFree
EncodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
CloseHandle
InitializeCriticalSectionAndSpinCount
FindFirstFileW
FindNextFileW
ExpandEnvironmentStringsW
FindClose
CreateFileW
GetFileAttributesW
CreateEventW
LoadLibraryExW
GetModuleFileNameW
SetLastError
GetSystemDirectoryW
HeapSetInformation
FlsSetValue
FlsGetValue
GetLastError
GetProcAddress
FreeLibrary
SetErrorMode
VirtualLock
GetProcessHeap
HeapAlloc
HeapFree
DecodePointer
RaiseException
TerminateProcess
GetCurrentProcess
GetModuleHandleW
IsProcessorFeaturePresent
FlsAlloc
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-crt-string-l1-1-0
towlower
iswspace
strcpy_s
isdigit
_wcsnicmp
_wcsicmp
ntdll
RtlUnwindEx
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlPcToFileHeader
RtlNtStatusToDosError
RtlGetVersion
api-ms-win-crt-runtime-l1-1-0
_configure_wide_argv
_initialize_wide_environment
_set_app_type
_seh_filter_exe
_crt_atexit
_get_initial_wide_environment
_initterm
_initterm_e
exit
_exit
__p___argc
_errno
__p___wargv
_c_exit
_register_thread_local_exe_atexit_callback
_initialize_onexit_table
_invalid_parameter_noinfo_noreturn
_register_onexit_function
_cexit
terminate
abort
api-ms-win-crt-stdio-l1-1-0
feof
fgetws
__stdio_common_vsprintf
__stdio_common_vswprintf
fclose
_set_fmode
__p__commode
_wfopen
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_callnewh
_calloc_base
free
_set_new_mode
malloc
_free_base
api-ms-win-crt-convert-l1-1-0
wcstol
crypt32
CertVerifyCertificateChainPolicy
wintrust
CryptCATCatalogInfoFromContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminAcquireContext
CryptCATAdminCalcHashFromFileHandle
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WinVerifyTrust
CryptCATAdminReleaseContext
CryptCATAdminReleaseCatalogContext
api-ms-win-crt-math-l1-1-0
ceilf
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ