d:\dbs\el\dec\target\x64\ship\delivery\x-none\ose.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fb38605b0c42023cfe97c8ab5a2808d8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb38605b0c42023cfe97c8ab5a2808d8_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fb38605b0c42023cfe97c8ab5a2808d8_JaffaCakes118
-
Size
637KB
-
MD5
fb38605b0c42023cfe97c8ab5a2808d8
-
SHA1
73a81c272e95589edfe2ea9407ce27708edbac3b
-
SHA256
c0287df7081a773ae6e767c5ea3342eca09aaffb42e54df7f28ba1b95fac3ac1
-
SHA512
0530d9e8acd25ddbf75f40fa009d314fa633d85f72433148b441cf315e1e591c64f0a9a94e95edb4deb03556793793a3e1c1a69d23cfeccbcf3da5775536d43b
-
SSDEEP
12288:Imw5HEjsChNYBFgl0W8m+CdFHihRLscBkf/+5rxILrF9klaS:lwuBOWbqinT9k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb38605b0c42023cfe97c8ab5a2808d8_JaffaCakes118
Files
-
fb38605b0c42023cfe97c8ab5a2808d8_JaffaCakes118.exe windows:6 windows x64 arch:x64
82aaeb59d4a73a4deeb6faa3fe26ddf6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegEnumValueW
SetThreadToken
RegSetValueExW
StartServiceCtrlDispatcherW
SetServiceStatus
RegNotifyChangeKeyValue
DuplicateToken
GetUserNameA
RegDeleteValueW
RegisterServiceCtrlHandlerW
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
LookupAccountNameW
ConvertStringSecurityDescriptorToSecurityDescriptorW
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
CryptReleaseContext
CryptAcquireContextW
SetFileSecurityW
RegDeleteKeyW
OpenThreadToken
kernel32
GetModuleFileNameW
GetLastError
SetEvent
CloseHandle
GetLogicalDrives
lstrlenW
lstrcmpW
GetDriveTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
Sleep
DeleteCriticalSection
ExitProcess
GetCommandLineW
SetErrorMode
CreateMutexW
WaitForMultipleObjectsEx
ReleaseMutex
CreateEventW
GetSystemInfo
ResetEvent
MoveFileExW
CreateProcessW
GetModuleHandleW
GetTickCount
ReadFile
SetFilePointer
CreateFileW
MultiByteToWideChar
CreateFileA
RaiseException
GetProcAddress
FreeLibrary
WideCharToMultiByte
DosDateTimeToFileTime
LoadLibraryExW
ReleaseSemaphore
WaitForMultipleObjects
WaitForSingleObject
CreateThread
CreateSemaphoreW
VirtualFree
VirtualAlloc
GlobalAlloc
GlobalFree
SetFilePointerEx
GetSystemTimeAsFileTime
CompareStringW
ExpandEnvironmentStringsW
WriteFile
SetFileTime
SetEndOfFile
SystemTimeToFileTime
GetSystemTime
LocalFree
FindClose
GetTempPathA
CreateDirectoryW
GetTempPathW
GetFileAttributesW
FindFirstFileW
GetFileSizeEx
QueryPerformanceCounter
DeleteFileW
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
GetStdHandle
lstrlenA
FindNextFileW
RemoveDirectoryW
SetFileAttributesW
GetCurrentProcess
GetFileAttributesExW
GetWindowsDirectoryW
CopyFileW
GetFileTime
GetComputerNameW
FormatMessageA
GetCurrentThread
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
GetProcessHeap
LoadLibraryExA
VirtualQuery
VirtualProtect
WriteConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RtlPcToFileHeader
GetModuleHandleExW
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
rpcrt4
RpcServerUseProtseqEpW
RpcServerUnregisterIf
RpcServerRegisterIfEx
RpcImpersonateClient
RpcRevertToSelf
NdrServerCall2
wintrust
WinVerifyTrust
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 400KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ