D:\project\MalwareScanner\Release\MalwareScan.pdb
Static task
static1
Behavioral task
behavioral1
Sample
68d76b1dacfcac5a9b9f2586bf69b9dd_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
68d76b1dacfcac5a9b9f2586bf69b9dd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
68d76b1dacfcac5a9b9f2586bf69b9dd_JaffaCakes118
-
Size
329KB
-
MD5
68d76b1dacfcac5a9b9f2586bf69b9dd
-
SHA1
b704c3f99315d38674bc24e516d64421f5a718f5
-
SHA256
c19fcff4d8b71c1e8d0d958c80d551c99313077deb39dbe24f25d27f0ce675a9
-
SHA512
007101d9ebe1b78f4896526bcdb8e14783d859f7f01c4151e19a5c605357c22167aed89720a04c2ebdbd0cae7bf2d5ddf48c111b1f2893869ff4e7e9fcca87f8
-
SSDEEP
6144:H5NiVxWd79mQLjx/6iSWOD1iEPX8O6+h5wogFO782w:ZcxuIW9CRdP8a5wogFQw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68d76b1dacfcac5a9b9f2586bf69b9dd_JaffaCakes118
Files
-
68d76b1dacfcac5a9b9f2586bf69b9dd_JaffaCakes118.exe windows:5 windows x86 arch:x86
17b67db05781c42837b9aa83f1191eb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc90
ord6076
ord1358
ord3534
ord2106
ord3627
ord6023
ord1357
ord636
ord367
ord4030
ord677
ord3538
ord4642
ord1685
ord1771
ord2692
ord4392
ord5152
ord5615
ord4617
ord5309
ord1810
ord1809
ord1678
ord3344
ord6388
ord1496
ord4668
ord3506
ord1603
ord6584
ord1320
ord1555
ord6793
ord5520
ord663
ord404
ord1321
ord1556
ord3466
ord3013
ord4308
ord2501
ord2490
ord665
ord406
ord6291
ord5636
ord4305
ord2905
ord6559
ord5167
ord744
ord524
ord2069
ord1500
ord6257
ord2899
ord2360
ord305
ord3213
ord1611
ord820
ord4431
ord2591
ord4993
ord1938
ord654
ord595
ord3519
ord4895
ord3277
ord3135
ord5633
ord1728
ord1791
ord1792
ord2139
ord5608
ord1446
ord3218
ord6356
ord5389
ord3671
ord6782
ord4160
ord6784
ord1644
ord2368
ord2375
ord2625
ord2607
ord2605
ord2623
ord2635
ord2612
ord2628
ord333
ord2616
ord2618
ord2620
ord2614
ord2630
ord2610
ord969
ord965
ord967
ord963
ord958
ord5666
ord5668
ord6446
ord1729
ord4688
ord5139
ord3732
ord5647
ord4589
ord6780
ord5497
ord2074
ord5585
ord4650
ord1497
ord4331
ord1752
ord1755
ord6391
ord3346
ord3987
ord639
ord374
ord2691
ord300
ord1607
ord12384
ord13174
ord9952
ord3479
ord525
ord3612
ord6078
ord4527
ord4396
ord5957
ord819
ord899
ord6154
ord781
ord580
ord1252
ord6155
ord791
ord587
ord2480
ord10437
ord10284
ord13116
ord12145
ord12597
ord7746
ord9945
ord4434
ord4409
ord6783
ord4159
ord6781
ord4733
ord2251
ord2206
ord6018
ord4165
ord1046
ord5533
ord6721
ord5813
ord4199
ord2087
ord3209
ord5657
ord5659
ord4507
ord4760
ord8432
ord4333
ord1545
ord608
ord800
ord324
ord702
ord1183
ord798
ord4981
ord5663
ord5646
ord6001
ord2766
ord2978
ord3107
ord4714
ord2961
ord3110
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4890
ord4667
ord9252
ord2208
ord1102
ord1137
ord6462
ord4197
ord7312
ord7118
ord4029
ord4952
ord5924
ord2481
ord5963
ord6670
ord4506
ord817
ord2539
ord316
ord601
ord310
ord266
ord453
ord3412
ord2896
ord3140
ord6327
ord4252
ord4248
ord3056
ord6616
ord3997
ord693
ord3554
ord4644
ord2280
ord2458
ord1247
ord2523
ord2633
ord265
ord1276
ord2141
msvcr90
memcpy
__CxxFrameHandler3
memset
_CxxThrowException
??1exception@std@@UAE@XZ
_setmbcp
_controlfp_s
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
getchar
printf
__iob_func
fprintf
tolower
_vsnprintf
calloc
_ismbcdigit
strtoul
malloc
free
fclose
fread
_fsopen
_strdup
strncat_s
_localtime64_s
strftime
_beginthreadex
memmove_s
sprintf_s
rand
_time64
srand
??0exception@std@@QAE@XZ
_invalid_parameter_noinfo
strstr
_stricmp
??0exception@std@@QAE@ABQBD@Z
_local_unwind4
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABV01@@Z
vsprintf_s
atoi
strrchr
kernel32
DeviceIoControl
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileSizeEx
LoadLibraryA
FreeLibrary
GetCurrentProcessId
MultiByteToWideChar
GetVersion
MoveFileA
MoveFileExA
SetFileAttributesA
CreateDirectoryA
GetCurrentProcess
CreateEventA
WaitForSingleObject
FindFirstFileA
Sleep
WideCharToMultiByte
GetCurrentDirectoryA
GetThreadSelectorEntry
SetThreadContext
FlushInstructionCache
VirtualProtectEx
VirtualQueryEx
IsBadWritePtr
ContinueDebugEvent
ReadProcessMemory
GetModuleHandleA
GetProcAddress
WriteProcessMemory
TerminateProcess
GetThreadContext
WaitForDebugEvent
CreateProcessA
DeleteFileA
CopyFileA
IsBadReadPtr
WriteFile
ReadFile
SetFilePointer
CreateFileA
CloseHandle
GetShortPathNameA
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
GetLastError
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
DeleteCriticalSection
InitializeCriticalSection
GetSystemDirectoryA
VirtualProtect
LoadLibraryExA
SuspendThread
OpenThread
Thread32Next
Thread32First
lstrcmpA
lstrlenA
OutputDebugStringA
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
QueryDosDeviceA
DuplicateHandle
OpenProcess
GetFileSize
SetLastError
ExpandEnvironmentStringsA
GetExitCodeProcess
GetModuleFileNameA
RemoveDirectoryA
GetVersionExA
GetLongPathNameA
GetTempPathA
FindClose
FindNextFileA
user32
AppendMenuA
LoadImageA
SetWindowTextA
GetSystemMetrics
IsIconic
SendMessageA
GetSystemMenu
DrawTextA
GetClientRect
DrawIcon
SetTimer
KillTimer
InvalidateRect
CopyRect
EnableWindow
FillRect
GetSysColor
gdi32
CreateRectRgnIndirect
advapi32
SetEntriesInAclA
OpenSCManagerA
CreateServiceA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
StartServiceA
ControlService
DeleteService
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
AllocateAndInitializeSid
RegEnumKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetFileSecurityA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderPathA
ShellExecuteExA
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsA
ole32
StringFromGUID2
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
??$?9DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?at@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IPBDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@@Z
??$?9DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?swap@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXAAV12@@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
?find_first_not_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
psapi
GetProcessImageFileNameA
EnumProcessModules
GetModuleBaseNameA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ws2_32
WSCWriteProviderOrder
WSCInstallProvider
WSCGetProviderPath
WSAStartup
WSACleanup
WSCDeinstallProvider
WSCEnumProtocols
Sections
.text Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ