C:\jenkins\workspace\xperia-companion-win.release\Build\Sony Companion\Win32\Release\XperiaCompanionAgent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
85b7e3589f8abcf5c3ce63c7c5dc0858_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
85b7e3589f8abcf5c3ce63c7c5dc0858_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
85b7e3589f8abcf5c3ce63c7c5dc0858_JaffaCakes118
-
Size
1.6MB
-
MD5
85b7e3589f8abcf5c3ce63c7c5dc0858
-
SHA1
d9c586b47b182bb228c5084a3c6589e3835ae0d9
-
SHA256
dae1d04a7eb42171c6fdf18323985053029959a76eb2a47989b5f9c967b9b977
-
SHA512
c260a35ec8d1366f2b7e08b87396aab7e3680a8fe9fa49bc2ea30f199a345514d85899fa376917d202a4b13855e788dfd4cb8a5780baa3ff7683d860b2319dd0
-
SSDEEP
49152:m3j5R10qyKlz0Ue6OUE8Jeannv97sKj5cqeEgVA:+deWnv13cq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85b7e3589f8abcf5c3ce63c7c5dc0858_JaffaCakes118
Files
-
85b7e3589f8abcf5c3ce63c7c5dc0858_JaffaCakes118.exe windows:6 windows x86 arch:x86
4c15f06ed5e471e327437568a44ca259
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DecodePointer
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
CreateMutexW
CloseHandle
GetModuleHandleW
GetProcAddress
Sleep
GetUserPreferredUILanguages
FindResourceW
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetVolumeInformationW
ExpandEnvironmentStringsW
TerminateProcess
GetUserDefaultUILanguage
GetSystemPowerStatus
DeleteCriticalSection
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetLocaleInfoA
OpenProcess
GetDiskFreeSpaceExW
GetVersionExA
GetNativeSystemInfo
GetUserGeoID
K32EnumProcesses
CreateProcessW
QueryFullProcessImageNameW
GetDriveTypeW
GetExitCodeProcess
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
InitializeCriticalSectionEx
GetLastError
GetVolumePathNameW
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
FreeLibrary
LoadLibraryExA
LocalFree
FormatMessageA
GetModuleFileNameW
GetTempFileNameW
GetFileSizeEx
ReOpenFile
WriteFile
SetFilePointerEx
ReadFile
SetFileTime
WideCharToMultiByte
MultiByteToWideChar
CreateDirectoryW
FindNextFileW
DeviceIoControl
RemoveDirectoryW
GetEnvironmentVariableW
SetEndOfFile
FindClose
GetFileAttributesExW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
WaitNamedPipeW
SetNamedPipeHandleState
PowerCreateRequest
PowerSetRequest
PowerClearRequest
CreateMutexA
OpenMutexA
ReleaseMutex
AreFileApisANSI
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
QueryPerformanceCounter
QueryPerformanceFrequency
EncodePointer
DuplicateHandle
WaitForSingleObjectEx
GetCurrentProcess
GetCurrentThread
GetExitCodeThread
GetStringTypeW
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
GetCurrentProcessId
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RtlUnwind
ExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
GetACP
GetFileType
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
ReadConsoleW
FindFirstFileExW
ws2_32
closesocket
getsockname
socket
ntohs
inet_ntop
bind
winhttp
WinHttpOpen
WinHttpCloseHandle
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
comdlg32
GetOpenFileNameW
iphlpapi
GetIpAddrTable
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 331KB - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ