RebootStub.pdb
Behavioral task
behavioral1
Sample
fe322f306bd5ccbe1b6156a09414b87d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fe322f306bd5ccbe1b6156a09414b87d_JaffaCakes118
-
Size
287KB
-
MD5
fe322f306bd5ccbe1b6156a09414b87d
-
SHA1
ab4d1b875d7009f45dc1d7376b8948343493b9c9
-
SHA256
a117aaa29cbb28f64611b5fc09665450882e0470cefb8063c16c3ce8186c7723
-
SHA512
afdd9d34cf16e5d6d098819e83fd7d9edd3f27ef6c241a974c5ff30842147563a60ae683039deac9245a6b087a1a0fc4e5661f770c09c88640ec93607bfa07bd
-
SSDEEP
6144:TAf0jRAO+raqb+QPj5PRTonbNwR0WUxoJk3/uot1FwbyIMoOZ2Nv5:12jPj5PRaq0WUxoJk3/uKFwbb0+x
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe322f306bd5ccbe1b6156a09414b87d_JaffaCakes118
Files
-
fe322f306bd5ccbe1b6156a09414b87d_JaffaCakes118.exe windows:5 windows x86 arch:x86
919389bcaae1e48dfe5476653a2993db
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegOpenKeyW
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyA
RegQueryValueExA
kernel32
lstrlenW
GetVersionExW
GetSystemDirectoryW
CreateFileW
CloseHandle
InitializeCriticalSection
GetCommandLineW
GetFileSize
ReadFile
DeleteFileW
DeleteCriticalSection
CreateProcessW
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
FreeLibrary
lstrcmpiW
MultiByteToWideChar
LoadLibraryExW
GetModuleHandleW
GetLastError
LoadLibraryW
GetProcAddress
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetFileAttributesW
HeapReAlloc
RtlUnwind
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
FlushInstructionCache
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
WideCharToMultiByte
LCMapStringW
HeapSize
InterlockedExchange
LoadLibraryA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
InterlockedCompareExchange
IsProcessorFeaturePresent
GetThreadLocale
GetCurrentProcess
SetLastError
RaiseException
GetCurrentThreadId
Sleep
GetDriveTypeW
FindResourceW
LoadResource
LockResource
SizeofResource
CreateSemaphoreW
WritePrivateProfileSectionW
CopyFileW
WaitForSingleObject
GetVersion
LocalAlloc
lstrcmpA
lstrlenA
LocalFree
MulDiv
CreateFileMappingW
MapViewOfFile
GetTempFileNameW
GetTempPathW
UnmapViewOfFile
EnterCriticalSection
TerminateProcess
user32
CharPrevW
SendMessageW
DefWindowProcW
CallWindowProcW
SetCursor
ReleaseCapture
GetSystemMetrics
GetWindowLongW
UnregisterClassA
DialogBoxParamW
MsgWaitForMultipleObjects
GetActiveWindow
CharNextW
SetWindowLongW
EndDialog
CreateWindowExW
LoadCursorW
GetClassInfoExW
RegisterClassExW
GetDC
MessageBoxW
GetWindowTextLengthW
GetDlgItemTextW
DispatchMessageW
TranslateMessage
PeekMessageW
GetDlgItem
SetDlgItemTextW
SetWindowTextW
GetParent
GetWindow
SystemParametersInfoW
GetWindowRect
MapWindowPoints
SetWindowPos
DestroyWindow
GetClientRect
BeginPaint
EndPaint
SetCapture
shell32
SHGetPathFromIDListW
ShellExecuteW
SHGetSpecialFolderLocation
ole32
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
oleaut32
VarUI4FromStr
SysFreeString
SysAllocStringLen
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
gdi32
DeleteObject
CreateFontIndirectW
GetDeviceCaps
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE