Service.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0b482a77d5bacdb4c4e23e798041cd35_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b482a77d5bacdb4c4e23e798041cd35_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0b482a77d5bacdb4c4e23e798041cd35_JaffaCakes118
-
Size
660KB
-
MD5
0b482a77d5bacdb4c4e23e798041cd35
-
SHA1
d4ea7bab44a4787e3ca69e48108fd868030755c6
-
SHA256
48dc16575c7e97bc261d2f64cf6567ed564874277e8c1f131420a87837d8b366
-
SHA512
17343fdd59cee875b5581c9d111cf6188b349e5513af0478d8994b40b9419853aa2a6e49d6ec3fecd36a7ec678adfebf9dd4e58ecd6676523238a8f8166166bc
-
SSDEEP
12288:Hb8EiDyurMFQ/EI92kU97VrcJa1BiQ9HdxZ438ZTAoZj2BV0DYOz:Hd8lrUBVrViQ9HdQ38ZTtdIHOz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b482a77d5bacdb4c4e23e798041cd35_JaffaCakes118
Files
-
0b482a77d5bacdb4c4e23e798041cd35_JaffaCakes118.exe windows:5 windows x86 arch:x86
bdb328dd0bb39d7c13978cc5698fdd54
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wsock32
connect
gethostname
WSAStartup
ioctlsocket
WSAGetLastError
send
sendto
socket
setsockopt
getsockopt
htons
gethostbyname
WSACleanup
closesocket
WSASetLastError
select
__WSAFDIsSet
recv
kernel32
InterlockedExchange
GetComputerNameA
DisconnectNamedPipe
GetOverlappedResult
WaitForMultipleObjects
ResetEvent
CancelIo
ConnectNamedPipe
FormatMessageA
CreateNamedPipeA
GetVersionExA
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapFree
HeapCreate
HeapDestroy
GetVolumeInformationA
GetTimeZoneInformation
GetACP
GetCurrentProcess
OpenProcess
TerminateProcess
FlushFileBuffers
CreateThread
GetDriveTypeA
DeviceIoControl
RemoveDirectoryA
CreateDirectoryA
GetWindowsDirectoryA
GetProcessHeap
GetFullPathNameA
InitializeCriticalSection
GetShortPathNameA
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetCPInfo
IsProcessorFeaturePresent
GetStartupInfoW
HeapSetInformation
GetCommandLineA
CreateProcessA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetDateFormatA
GetTimeFormatA
DecodePointer
EncodePointer
FindFirstFileExA
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitThread
RtlUnwind
GetSystemTimeAsFileTime
ExitProcess
GetStdHandle
GetModuleFileNameW
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetCurrentDirectoryW
LeaveCriticalSection
EnterCriticalSection
GetCurrentDirectoryA
LCMapStringW
SetCurrentDirectoryA
FindFirstFileA
GetFileAttributesA
SetFileAttributesA
FindNextFileA
FindClose
WaitForSingleObject
GetFileSize
FreeLibrary
GetLastError
LoadLibraryA
GetProcAddress
LocalReAlloc
LocalFree
LocalAlloc
DeleteFileA
GetVersion
GetSystemDirectoryA
MultiByteToWideChar
WriteFile
CreateFileA
Sleep
ReadFile
SetFilePointer
CloseHandle
GetTickCount
VirtualProtect
HeapSize
GetStringTypeW
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
LoadLibraryW
HeapReAlloc
GetDriveTypeW
SetStdHandle
WriteConsoleW
CreateFileW
CompareStringW
OpenFileMappingA
GetCurrentProcessId
InterlockedIncrement
lstrlenA
WideCharToMultiByte
InterlockedDecrement
GetModuleHandleA
GetModuleFileNameA
GetCurrentThreadId
CreateEventA
SetEvent
GetSystemTime
ResumeThread
CopyFileA
MoveFileA
DeleteCriticalSection
TerminateThread
GetFileTime
SetFileTime
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
IsDebuggerPresent
SetEndOfFile
GetComputerNameW
SetEnvironmentVariableA
user32
GetWindowTextA
ExitWindowsEx
GetKeyboardLayout
MapVirtualKeyA
EnumDisplaySettingsA
wsprintfW
GetKeyNameTextA
CreateDialogParamA
UpdateWindow
ShowWindow
IsWindow
EndDialog
PostQuitMessage
MapVirtualKeyExA
GetSystemMetrics
SetCursor
MessageBoxA
LoadStringA
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
GetPropA
SetPropA
DefWindowProcA
PostMessageA
UnregisterClassA
GetDC
ReleaseDC
GetCursorPos
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
KillTimer
PostThreadMessageA
wsprintfA
GetForegroundWindow
gdi32
GetStockObject
GetDeviceCaps
advapi32
RegCreateKeyExA
RegConnectRegistryA
GetUserNameA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ConvertStringSecurityDescriptorToSecurityDescriptorA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetEntriesInAclA
GetSecurityInfo
GetTokenInformation
RegCloseKey
RegGetKeySecurity
RegOpenKeyExA
RegSetKeySecurity
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
RegEnumValueA
DeregisterEventSource
CloseServiceHandle
OpenServiceA
OpenSCManagerA
StartServiceA
QueryServiceStatus
ControlService
SetServiceStatus
ReportEventA
RegisterEventSourceA
DeleteService
RegisterServiceCtrlHandlerA
RegCreateKeyA
CreateServiceA
StartServiceCtrlDispatcherA
InitiateSystemShutdownA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoInitialize
CoUninitialize
CoTaskMemFree
StringFromCLSID
CoInitializeEx
CoCreateInstance
oleaut32
VariantInit
VariantClear
SysAllocString
SysFreeString
SysAllocStringLen
Sections
.text Size: 392KB - Virtual size: 392KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ