d:\nightlytrad\powerword2009\temp\link\cbappendix\rebug\CBAppendix.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fb1011c999abdc66661c9a8092420948_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb1011c999abdc66661c9a8092420948_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fb1011c999abdc66661c9a8092420948_JaffaCakes118
-
Size
268KB
-
MD5
fb1011c999abdc66661c9a8092420948
-
SHA1
10886b33764022e354e87d946b468c2dba1559d8
-
SHA256
42e005d0db2e8cbf34d0788d29240db42599fdfd5c2b815fc1a192aeafa6ca69
-
SHA512
892197ac8ab64cc9e8c7fc0400ed5a03c34d54c943fb72495fe67ba9e1c07264468d1940e241a8b6191cccab5306561554812ac152b4d4e4d6c9b75974d67c8d
-
SSDEEP
3072:edMS2s+FEFGKcDqyxCmGDausfbU2b6f1WwnvOsINfVutndaRdk9tBFnUcMLH:c21FEeWWCmnuybzb6p8NfVWWixycM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb1011c999abdc66661c9a8092420948_JaffaCakes118
Files
-
fb1011c999abdc66661c9a8092420948_JaffaCakes118.exe windows:4 windows x86 arch:x86
0a45af63ea43f166c1884cad1d0949df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetEvent
GetCommandLineW
SetEndOfFile
CreateFileW
CreateFileA
GetCurrentThreadId
CreateEventW
CreateThread
Sleep
WaitForSingleObject
CloseHandle
GetModuleFileNameA
GetModuleHandleW
LoadLibraryExW
SetStdHandle
FindResourceW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStartupInfoA
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
GetModuleFileNameW
LeaveCriticalSection
EnterCriticalSection
FindFirstFileA
FindClose
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
GetLastError
lstrlenW
DeleteCriticalSection
InitializeCriticalSection
RaiseException
WriteConsoleW
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
WideCharToMultiByte
HeapFree
GetProcessHeap
GetFileAttributesA
LCMapStringW
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapReAlloc
GetStartupInfoW
LCMapStringA
GetCPInfo
GetProcAddress
GetModuleHandleA
ExitProcess
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
SetHandleCount
GetFileType
user32
DispatchMessageW
UnregisterClassA
CharNextW
TranslateMessage
GetMessageW
CharUpperW
PostThreadMessageW
wsprintfW
advapi32
RegDeleteKeyW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoInitialize
CoUninitialize
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterClassObject
StringFromGUID2
CoCreateInstance
oleaut32
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
LoadRegTypeLi
SysStringLen
VarUI4FromStr
SafeArrayRedim
SafeArrayDestroy
SafeArrayCreate
SysStringByteLen
SysAllocStringByteLen
SafeArrayLock
SafeArrayUnlock
SafeArrayGetLBound
SafeArrayGetUBound
SysAllocString
VariantClear
SafeArrayCopy
SysFreeString
SafeArrayGetVartype
judianservice
?AddQuery@QueryTerm@@QAE_NPB_W0W4QueryType@@W4QueryCond@@@Z
?Release@JudianService@@QAEXXZ
?StopServer@JudianService@@QAE_NXZ
??0SearchIndex@@QAE@PBDW4CodeType@@@Z
?Search@SearchIndex@@QAEHPB_WPBVQueryTerm@@II@Z
?Instance@JudianService@@SAPAV1@XZ
?InitServer@JudianService@@QAE_NPBD@Z
??1SearchIndex@@UAE@XZ
?GetTotalCount@SearchIndex@@QAEHXZ
?FetchNext@SearchIndex@@QAEPAPADXZ
?GetSegmentResult@SearchIndex@@QAEPAPADXZ
??1CDllObject@@UAE@XZ
??3CDllObject@@SAXPAX@Z
??0QueryTerm@@QAE@W4CodeType@@@Z
??1QueryTerm@@UAE@XZ
??2CDllObject@@SAPAXI@Z
??1JudianService@@MAE@XZ
Exports
Exports
??0CDllObject@@QAE@ABV0@@Z
??0JudianService@@QAE@ABV0@@Z
??0QueryTerm@@QAE@ABV0@@Z
??0SearchIndex@@QAE@ABV0@@Z
??4CDllObject@@QAEAAV0@ABV0@@Z
??4JudianService@@QAEAAV0@ABV0@@Z
??4QueryTerm@@QAEAAV0@ABV0@@Z
??4SearchIndex@@QAEAAV0@ABV0@@Z
??_7CDllObject@@6B@
??_7JudianService@@6B@
??_7QueryTerm@@6B@
??_7SearchIndex@@6B@
??_FQueryTerm@@QAEXXZ
?GetCodeType@SearchIndex@@QAE?AW4CodeType@@XZ
?GetSearchTime@SearchIndex@@QAE_KXZ
?IsInited@JudianService@@QAE_NXZ
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.. Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE