C:\Users\brs\Desktop\UACME-3.2.7\Source\Akagi\output\x64\Debug\Akagi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8c601fea1e26c5d5786f292d2a65c6f7_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8c601fea1e26c5d5786f292d2a65c6f7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
8c601fea1e26c5d5786f292d2a65c6f7_JaffaCakes118
-
Size
436KB
-
MD5
8c601fea1e26c5d5786f292d2a65c6f7
-
SHA1
ed1200fbe10bd4cd10e50956213a6466b5c7ee94
-
SHA256
6683fd9b0ba527b6a6a0a382efdb352f147bc89b131b5a7b9f4e27a3473a86ab
-
SHA512
b1049bbb3437fa932d3d3206cfb30e8a6adfea0ba77ab634fb0de20a2623e2e91d0163ce85c6fe07883fc25692c9322971771dafbb222aa39c3cafe8a31872fd
-
SSDEEP
6144:YEG79lV06GbfrRyl9/ro9CJhZKpR7goejzr:Y95jlGblylt3MXQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c601fea1e26c5d5786f292d2a65c6f7_JaffaCakes118
Files
-
8c601fea1e26c5d5786f292d2a65c6f7_JaffaCakes118.exe windows:6 windows x64 arch:x64
d3ecd7d8f1b76bc66e59dd2502abb6e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetFileSizeEx
GetFileTime
SetEndOfFile
DebugBreak
OutputDebugStringW
VirtualFree
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FreeLibrary
LoadLibraryW
ContinueDebugEvent
WaitForDebugEvent
SetEvent
CreateProcessW
CreateDirectoryW
FindNextFileW
DeleteProcThreadAttributeList
UpdateProcThreadAttribute
TerminateThread
GetCurrentProcess
GetCurrentThreadId
LoadLibraryExW
GetProcessHeap
HeapFree
MultiByteToWideChar
RaiseException
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FindFirstFileW
FindClose
CreateFileW
CompareFileTime
ResumeThread
DeleteFileW
CreateThread
CopyFileW
GetProcAddress
GetModuleHandleW
HeapAlloc
GetFileAttributesW
TerminateProcess
InitializeProcThreadAttributeList
Sleep
HeapDestroy
HeapCreate
WideCharToMultiByte
FileTimeToDosDateTime
GetTempFileNameA
GetTempPathA
WriteFile
SetFilePointer
ReadFile
GetFileInformationByHandle
FileTimeToLocalFileTime
DeleteFileA
CreateFileA
ExitThread
GetCommandLineW
LocalFree
LocalAlloc
CreateEventW
WaitForSingleObject
SetLastError
GetLastError
CloseHandle
GetModuleFileNameW
ExitProcess
GetStartupInfoW
VirtualAlloc
VirtualQuery
user32
GetDC
CreateWindowExW
UnregisterClassW
GetUserObjectInformationW
MessageBoxW
GetDesktopWindow
GetProcessWindowStation
RegisterClassExW
GetThreadDesktop
PostQuitMessage
DefWindowProcW
SendMessageW
DispatchMessageW
wsprintfW
TranslateMessage
GetMessageW
LoadImageW
gdi32
SetPixelFormat
SwapBuffers
ChoosePixelFormat
advapi32
RegCopyTreeW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegOpenKeyW
RegEnumKeyExW
CreateProcessWithLogonW
CreateProcessAsUserW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
CreateWellKnownSid
RegQueryInfoKeyW
RegEnumValueW
RegCreateKeyW
RegQueryValueExW
RegOpenKeyExW
RegFlushKey
RegDeleteValueW
RegSetValueExW
shell32
SHCreateItemFromParsingName
SHGetKnownFolderPath
ShellExecuteExW
ole32
CoInitializeEx
CoCreateInstance
StringFromGUID2
CoCreateGuid
StringFromCLSID
CoTaskMemFree
CoGetObject
CoUninitialize
oleaut32
SafeArrayCreateVector
SafeArrayUnaccessData
SafeArrayAccessData
SysFreeString
SysAllocString
SafeArrayDestroy
vcruntime140d
__C_specific_handler_noexcept
__vcrt_LoadLibraryExW
__vcrt_GetModuleFileNameW
__vcrt_GetModuleHandleW
__C_specific_handler
memcpy
ucrtbased
_CrtDbgReport
strcpy_s
strcat_s
__stdio_common_vsprintf_s
_wmakepath_s
_wsplitpath_s
wcscpy_s
_CrtDbgReportW
ntdll
NtSetInformationToken
NtOpenProcess
NtSetInformationThread
NtRemoveProcessDebug
LdrAccessResource
LdrEnumerateLoadedModules
LdrFindResource_U
LdrFindEntryForAddress
LdrGetDllHandle
NtFilterToken
RtlFormatCurrentUserKeyPath
RtlAppendUnicodeStringToString
RtlAppendUnicodeToString
RtlExpandEnvironmentStrings_U
RtlGetCurrentPeb
RtlAcquirePebLock
RtlReleasePebLock
RtlRaiseStatus
RtlLengthRequiredSid
RtlPrefixUnicodeString
RtlSubAuthoritySid
RtlSubAuthorityCountSid
RtlRandomEx
RtlGetVersion
RtlNtStatusToDosErrorNoTeb
RtlWow64EnableFsRedirectionEx
RtlCreateHeap
RtlDestroyHeap
RtlSetHeapInformation
RtlCreateBoundaryDescriptor
RtlDeleteBoundaryDescriptor
RtlAddSIDToBoundaryDescriptor
NtQuerySystemInformation
NtCreatePrivateNamespace
NtDeletePrivateNamespace
NtFsControlFile
NtReadFile
NtQueryInformationFile
NtCreateSection
NtMapViewOfSection
NtUnmapViewOfSection
NtCreateKey
NtEnumerateValueKey
NtQueryValueKey
NtDeleteKey
NtDeleteValueKey
NtQueryInformationProcess
NtFreeVirtualMemory
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
NtDuplicateToken
NtOpenProcessToken
NtDuplicateObject
DbgUiSetThreadDebugObject
RtlLengthSid
RtlAllocateAndInitializeSid
RtlFreeSid
NtSetValueKey
NtWriteVirtualMemory
NtAllocateVirtualMemory
NtResumeProcess
NtSuspendProcess
NtTerminateProcess
NtOpenKey
RtlImageNtHeader
RtlCreateUserThread
NtNotifyChangeDirectoryFile
NtCreateFile
NtWaitForSingleObject
NtSetEvent
NtCreateEvent
RtlDosPathNameToNtPathName_U
RtlFreeUnicodeString
NtDeleteFile
NtClose
RtlComputeCrc32
RtlQueryElevationFlags
RtlGetFrame
RtlPopFrame
RtlPushFrame
NtIsProcessInJob
NtCompressKey
RtlImageDirectoryEntryToData
RtlFreeHeap
RtlAllocateHeap
RtlInitUnicodeString
LdrUnloadDll
LdrLoadDll
LdrGetDllHandleEx
NtQueryInformationToken
RtlEqualUnicodeString
RtlInitializeSid
apphelp
SdbBeginWriteListTag
SdbCreateDatabase
SdbWriteStringTag
SdbEndWriteListTag
SdbWriteBinaryTag
SdbWriteDWORDTag
SdbCloseDatabaseWrite
rpcrt4
RpcBindingFree
UuidCreateNil
RpcBindingFromStringBindingW
RpcStringBindingComposeW
RpcStringFreeW
RpcBindingSetAuthInfoExW
NdrAsyncClientCall
RpcAsyncInitializeHandle
RpcAsyncCompleteCall
UuidCompare
RpcRaiseException
opengl32
wglMakeCurrent
glDrawBuffer
wglCreateContext
glReadPixels
glVertex2i
glClear
glBegin
glColor4i
glLoadIdentity
glDrawPixels
glEnd
glMatrixMode
comctl32
ord17
cabinet
ord13
ord11
ord10
ord14
msdelta
DeltaFree
ApplyDeltaB
GetDeltaInfoB
bcrypt
BCryptDecrypt
BCryptGenerateSymmetricKey
BCryptCloseAlgorithmProvider
BCryptGetProperty
BCryptOpenAlgorithmProvider
BCryptDestroyKey
Sections
.textbss Size: - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 1024B - Virtual size: 874B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rtc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 337B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ