C:\re\jdk7u45\229\build\windows-amd64\tmp\jabswitch\jabswitch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f938df977066e5af3b8256a7b8f84850_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f938df977066e5af3b8256a7b8f84850_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f938df977066e5af3b8256a7b8f84850_JaffaCakes118
-
Size
1.0MB
-
MD5
f938df977066e5af3b8256a7b8f84850
-
SHA1
44211f296ae4a1f4b00b2c78fe0134a6f5bb85c1
-
SHA256
fb11161254463b40a4391a3be42e1c80b92585059035ddfbb429353fbef3a4fe
-
SHA512
667b85263b4aa69bb584c2909a12ace6d5abda2d068cb85cb93d2197f4a4cc7ef98b7ee6461bb4afa26b38ba7af8856b5718ee50ccfeafcc36a988b18f59dfe8
-
SSDEEP
12288:gwj0bidyzNJbT7SYAwSfxL/2Dc3jDLLmt0LDQewsAjRhQBmed1hr61DUtLpm1Ewn:dQf6aewsAjC7WUtLpwbtLpw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f938df977066e5af3b8256a7b8f84850_JaffaCakes118
Files
-
f938df977066e5af3b8256a7b8f84850_JaffaCakes118.exe windows:5 windows x64 arch:x64
4b28658f0faec3fceb2d96685cc1842a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
user32
wsprintfW
msvcr100
strcpy_s
vsprintf_s
_CRT_RTC_INITW
_amsg_exit
__getmainargs
__C_specific_handler
_XcptFilter
_exit
_cexit
exit
strcat_s
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
__crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
wcscpy_s
wcstok_s
wcscat_s
wcsstr
_wcslwr_s
wcslen
??2@YAPEAX_K@Z
_dupenv_s
printf
perror
free
fopen_s
fprintf
fclose
remove
_errno
rename
strstr
feof
fgets
_stricmp
fputs
strtok_s
memset
__initenv
kernel32
VirtualQuery
GetProcessHeap
HeapAlloc
HeapFree
FreeLibrary
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
LoadLibraryW
GetProcAddress
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EncodePointer
Sleep
GetCurrentProcessId
ProcessIdToSessionId
GetModuleFileNameW
GetVersionExW
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 972B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 410B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ