c:\She\very\Wheel\let\DivideMust.pdb
Static task
static1
Behavioral task
behavioral1
Sample
95f3b9b1e5b61fb464b230ecf1d7460c_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
95f3b9b1e5b61fb464b230ecf1d7460c_JaffaCakes118
-
Size
485KB
-
MD5
95f3b9b1e5b61fb464b230ecf1d7460c
-
SHA1
acaeae790062cd29b0a6becf43a335c85a256830
-
SHA256
60dbe14b2e1d09d05caa3119170ebaed8f66b115ada3054ecab4db4396a66a31
-
SHA512
b551dec9be7c23d781b789474acea71caea8783477d65f60d6868cf3765aeb1149dca10a1d08e5d5f72a675f011db418fe2ccc8518426b0c52fe77be23ab374c
-
SSDEEP
12288:mD9UDevpMtdoe83GWLh6iVMGPQtYLwqYZy4e:hiq/H8hh6O9QtqHYZS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 95f3b9b1e5b61fb464b230ecf1d7460c_JaffaCakes118
Files
-
95f3b9b1e5b61fb464b230ecf1d7460c_JaffaCakes118.exe windows:6 windows x86 arch:x86
3d0d968829e97a969e3897cb10291d3d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindNextFileA
IsValidCodePage
GetOEMCP
FindFirstFileExA
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetStringTypeW
GetProcessHeap
WriteConsoleW
HeapSize
HeapReAlloc
DecodePointer
FlushFileBuffers
LocalFree
CreateThread
GetSystemDirectoryA
Sleep
LocalAlloc
GetEnvironmentVariableA
GetCPInfo
FindClose
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetLastError
GetModuleFileNameW
RaiseException
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
QueryPerformanceFrequency
CreateFileW
GetFileType
CloseHandle
GetStdHandle
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetConsoleCP
GetConsoleMode
SetStdHandle
SetEndOfFile
ReadFile
ReadConsoleW
SetFilePointerEx
GetFileAttributesExW
SetFileAttributesW
GetTimeZoneInformation
VirtualProtect
user32
GetCursorPos
RegisterClassExA
GetWindowTextLengthA
SetScrollInfo
GetFocus
InflateRect
GetScrollInfo
IsWindow
GetClassInfoExA
SetMenuItemInfoA
SetWindowLongA
CallWindowProcA
ExitWindowsEx
CreateWindowExA
IntersectRect
SetFocus
SetParent
EndDeferWindowPos
LoadIconA
AppendMenuA
gdi32
ScaleWindowExtEx
SelectClipRgn
ScaleViewportExtEx
CreateRectRgn
CreateFontA
SetViewportExtEx
OffsetViewportOrgEx
CreateCompatibleDC
GetPixel
comctl32
ImageList_LoadImageA
ord6
CreatePropertySheetPageA
PropertySheetA
advapi32
SystemFunction036
SetSecurityDescriptorDacl
SetEntriesInAclA
CreateServiceW
RegCloseKey
StartServiceCtrlDispatcherA
QueryServiceStatus
RegDeleteKeyA
RegQueryValueExA
AllocateAndInitializeSid
LookupPrivilegeValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
OpenSCManagerA
RegCreateKeyExA
ControlService
OpenProcessToken
FreeSid
InitializeSecurityDescriptor
RegOpenKeyExA
OpenThreadToken
OpenServiceA
wintrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WinVerifyTrust
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ