wab.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eb9eb138b6cbe9293747d137330059aa_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eb9eb138b6cbe9293747d137330059aa_JaffaCakes118
-
Size
533KB
-
MD5
eb9eb138b6cbe9293747d137330059aa
-
SHA1
52254bc03178833cfc58b508744c5656a9b055b8
-
SHA256
6175d694b6e941d5a05a52ec6eb690149930293f3da5471df2732121efc5f56a
-
SHA512
c22a644b2ee44676dd06bb139b124771bb2bb04c4d7a5e217dbd325cbafc4bf52d629f4119b98dad18a4d2bef3c7465cc0b551df51203e0c34d5c35d956703a7
-
SSDEEP
12288:W90Tx5KRZ18xtSP+szdcIugOO50MMEMOkPMg:w1mxtSP+sJ+O5FWPP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb9eb138b6cbe9293747d137330059aa_JaffaCakes118
Files
-
eb9eb138b6cbe9293747d137330059aa_JaffaCakes118.exe windows:10 windows x64 arch:x64
ebe0ce83b3c5863acca11795857482fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegQueryValueExW
EventUnregister
RegOpenKeyExW
EventSetInformation
EventRegister
EventWriteTransfer
RegCloseKey
kernel32
ExpandEnvironmentStringsW
GetCommandLineW
GetLastError
LoadLibraryW
HeapSetInformation
GetProcAddress
LocalFree
GetProcessHeap
FreeLibrary
Sleep
HeapFree
GetFileAttributesW
DelayLoadFailureHook
ResolveDelayLoadedAPI
LocalAlloc
IsDBCSLeadByte
HeapAlloc
RegisterApplicationRestart
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetStartupInfoW
gdi32
GetStockObject
user32
PostQuitMessage
LoadCursorW
LoadIconW
RegisterClassW
LoadStringW
CreateWindowExW
MessageBoxW
DefWindowProcW
msvcrt
_ismbblead
_cexit
memset
exit
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
_initterm
_commode
?terminate@@YAXXZ
__setusermatherr
__C_specific_handler
_fmode
memcpy
_acmdln
_exit
shell32
CommandLineToArgvW
shlwapi
PathFindExtensionW
PathAppendW
StrCmpIW
PathRemoveFileSpecW
StrCmpNIW
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 488KB - Virtual size: 488KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE