PDFPrevHndlrShim.pdb
Static task
static1
Behavioral task
behavioral1
Sample
086f3dc80f7761f9aebe1a288ea83a46_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
086f3dc80f7761f9aebe1a288ea83a46_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
086f3dc80f7761f9aebe1a288ea83a46_JaffaCakes118
-
Size
181KB
-
MD5
086f3dc80f7761f9aebe1a288ea83a46
-
SHA1
e4591df8b5761b276b512e78921eab57730f4950
-
SHA256
24dde0f68e795cb4023c3a8aa406242ce69222fec96f0cfe3a5caf96b81a06c0
-
SHA512
4eee3f80d3b898d396b720c1501d938f572e36f0edf241eceec1039f94c7b3ad2180c5917dc3d4075bf395f144f5157b52940d3ad1116ea37282b7361b7f9c59
-
SSDEEP
3072:N7AvbZCzspf/GN5pt7pMYM6kjHSFGhZzfQEW8BuR:N0bZPpf/ItujFzYf6q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 086f3dc80f7761f9aebe1a288ea83a46_JaffaCakes118
Files
-
086f3dc80f7761f9aebe1a288ea83a46_JaffaCakes118.exe windows:4 windows x86 arch:x86
d5ec32e11cf49bd1c1882e328c91e13e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
GetCurrentProcess
GetProcAddress
CloseHandle
WaitForSingleObject
Sleep
GetModuleFileNameW
CreateEventW
GetCurrentThreadId
SetEvent
GetCommandLineW
LCMapStringW
LCMapStringA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
InterlockedIncrement
lstrcmpiW
GetLastError
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CreateThread
lstrlenW
GetStringTypeA
WideCharToMultiByte
IsValidCodePage
GetOEMCP
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
GetProcessHeap
GetStartupInfoW
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
user32
UnregisterClassA
TranslateMessage
DispatchMessageW
GetMessageW
PostThreadMessageW
CharUpperW
CharNextW
advapi32
RegQueryValueExA
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExA
ole32
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoInitialize
CoUninitialize
CoRevokeClassObject
CoRegisterClassObject
StringFromGUID2
CoTaskMemRealloc
oleaut32
SysFreeString
SysStringLen
LoadRegTypeLi
LoadTypeLi
SysAllocString
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
rpcrt4
CStdStubBuffer_DebugServerRelease
NdrCStdStubBuffer2_Release
NdrCStdStubBuffer_Release
CStdStubBuffer_DebugServerQueryInterface
IUnknown_QueryInterface_Proxy
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
NdrOleAllocate
NdrStubForwardingFunction
CStdStubBuffer_CountRefs
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
CStdStubBuffer_Disconnect
CStdStubBuffer_Connect
CStdStubBuffer_AddRef
CStdStubBuffer_QueryInterface
NdrOleFree
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 4KB - Virtual size: 539B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.morpc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE