C:\Users\user\Desktop\USBDeview\Encrypt\x64\Release\Tes.pdb
Static task
static1
Behavioral task
behavioral1
Sample
075fde76356266570e4801a1f0e852ae_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
075fde76356266570e4801a1f0e852ae_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
075fde76356266570e4801a1f0e852ae_JaffaCakes118
-
Size
53KB
-
MD5
075fde76356266570e4801a1f0e852ae
-
SHA1
c6fa790f37e0a30b1c6cc9014fefc9164adc8a16
-
SHA256
2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de
-
SHA512
4cff70eff3f0d4c6df0b05d6b6de916e86d0b8575858ef925932d27214756afce0cc5d621bb93934d24ee5aa4ee54a2fba808e4098d8beb360a1682d6b3ccee4
-
SSDEEP
1536:7C7UjgsIAgRR5UjLSXIcO7GWJStlY27VqmSVzyqYvd0bRPp24dfG+2yz5+eBGF3k:7/jLaRujOXIcODStlY27VqmSVzyqYvd2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 075fde76356266570e4801a1f0e852ae_JaffaCakes118
Files
-
075fde76356266570e4801a1f0e852ae_JaffaCakes118.exe windows:5 windows x64 arch:x64
5a7d408cf73904096f39ecbcb88f4f38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
RtlLookupFunctionEntry
ExitProcess
GetCurrentThread
GetLastError
GetModuleFileNameW
GetDriveTypeW
GetCurrentDirectoryW
GetLogicalDriveStringsW
FindNextFileW
FindFirstFileW
MoveFileW
LocalFree
CloseHandle
CreateFileW
LocalAlloc
InitializeSListHead
GetSystemTimeAsFileTime
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
CreateProcessW
WriteFile
ReadFile
GetCurrentThreadId
RtlCaptureContext
advapi32
CryptEncrypt
CryptGenKey
CryptImportKey
LookupPrivilegeValueW
AdjustTokenPrivileges
ImpersonateSelf
OpenThreadToken
CryptDestroyKey
CryptAcquireContextW
CryptSetKeyParam
CryptGenRandom
CryptExportKey
CryptReleaseContext
shell32
ShellExecuteW
msvcp140
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?always_noconv@codecvt_base@std@@QEBA_NXZ
??Bid@locale@std@@QEAA_KXZ
_Cnd_init_in_situ
_Mtx_destroy_in_situ
_Mtx_init_in_situ
_Cnd_destroy_in_situ
_Thrd_hardware_concurrency
?_Throw_Cpp_error@std@@YAXH@Z
_Cnd_do_broadcast_at_thread_exit
_Cnd_wait
_Thrd_id
_Thrd_join
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
_Mtx_unlock
_Mtx_lock
?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Throw_C_error@std@@YAXH@Z
?_Xout_of_range@std@@YAXPEBD@Z
?uncaught_exception@std@@YA_NXZ
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
??0_Lockit@std@@QEAA@H@Z
??1_Lockit@std@@QEAA@XZ
_Cnd_signal
?_Xlength_error@std@@YAXPEBD@Z
crypt32
CryptStringToBinaryA
CryptDecodeObjectEx
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcpy
memmove
memset
__std_exception_destroy
__current_exception_context
__current_exception
__std_exception_copy
__std_terminate
__C_specific_handler
_CxxThrowException
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
free
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_cexit
_seh_filter_exe
_set_app_type
_register_onexit_function
_initterm
_initterm_e
exit
_exit
_initialize_onexit_table
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_beginthreadex
_configure_narrow_argv
system
_get_initial_narrow_environment
terminate
_initialize_narrow_environment
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
__stdio_common_vswprintf
_get_stream_buffer_pointers
_fseeki64
fread
fsetpos
ungetc
setvbuf
fgetpos
fwrite
fgetc
fclose
fflush
fputc
api-ms-win-crt-filesystem-l1-1-0
_wchdir
_unlock_file
_lock_file
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ