sdbinst.pdb
Behavioral task
behavioral1
Sample
0c683849b5824155bc3843ca05fc5fed_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0c683849b5824155bc3843ca05fc5fed_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0c683849b5824155bc3843ca05fc5fed_JaffaCakes118
-
Size
223KB
-
MD5
0c683849b5824155bc3843ca05fc5fed
-
SHA1
cfbd1cdfe2b9ace2cc8637b18e293380137bd12b
-
SHA256
46277aefac0f4daf82620f4c418b77ebd6fa2bf0fc0ee8da226c3456d730044e
-
SHA512
57145e4a11b281ffad9f160dbbc6b6519d85e8225149d1e17d8dc694cdfddb853994d8723b160716dc044c047a66122d89a0a74b3581ab68a5bb5fc4e3033e6f
-
SSDEEP
6144:irgTs90FzsFRtShkI/4XB3k7CCyaDG1BsZ/:hTs9ntShQXB3uCCyYG16Z/
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c683849b5824155bc3843ca05fc5fed_JaffaCakes118
Files
-
0c683849b5824155bc3843ca05fc5fed_JaffaCakes118.exe windows:5 windows x86 arch:x86
66170160ffbe112813cc1e239008f816
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryInfoKeyA
RegDeleteValueW
SetNamedSecurityInfoW
SetEntriesInAclA
GetNamedSecurityInfoW
RegQueryInfoKeyW
RegQueryValueExW
RegEnumKeyExW
RegEnumValueW
kernel32
OutputDebugStringA
WriteFile
CreateFileW
GetSystemWindowsDirectoryW
CloseHandle
GetProcAddress
LoadLibraryW
FindClose
FindFirstFileW
FindNextFileW
ExpandEnvironmentStringsW
CreateDirectoryW
GetFileAttributesW
DeleteFileW
SetFileAttributesW
CopyFileW
GetSystemTimeAsFileTime
GetCommandLineW
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetLastError
GetFullPathNameW
ExitProcess
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
HeapAlloc
GetCurrentDirectoryW
LCMapStringA
WideCharToMultiByte
LCMapStringW
LoadLibraryA
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
GetDriveTypeA
GetLocaleInfoA
GetCPInfo
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
user32
wsprintfW
LoadStringW
MessageBoxW
shell32
CommandLineToArgvW
ntdll
NtWriteFile
strchr
isdigit
strspn
RtlAppendUnicodeToString
RtlAppendUnicodeStringToString
RtlFreeHeap
RtlQueryEnvironmentVariable_U
NtMapViewOfSection
NtCreateSection
NtQueryInformationFile
NtUnmapViewOfSection
NtProtectVirtualMemory
NtAllocateVirtualMemory
NtFreeVirtualMemory
NtQuerySystemInformation
NtQueryVirtualMemory
RtlAnsiStringToUnicodeString
RtlUnicodeStringToInteger
RtlAllocateHeap
DbgPrint
RtlExpandEnvironmentStrings_U
RtlGetVersion
NtSetInformationFile
RtlInitAnsiString
strpbrk
NtOpenKey
NtCreateKey
NtSetValueKey
NtSetInformationKey
sprintf
RtlUpcaseUnicodeString
RtlCopyUnicodeString
qsort
NtClose
RtlDosPathNameToNtPathName_U
NtDeleteFile
NtCreateFile
RtlGUIDFromString
RtlInitUnicodeString
NtDeleteKey
RtlStringFromGUID
RtlFreeUnicodeString
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 148KB - Virtual size: 384KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE