upnpcont.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0eab2a9ee6655d40747edb4b48251ff3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0eab2a9ee6655d40747edb4b48251ff3_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0eab2a9ee6655d40747edb4b48251ff3_JaffaCakes118
-
Size
20KB
-
MD5
0eab2a9ee6655d40747edb4b48251ff3
-
SHA1
d8d3c1db940915d281e2bba3b7ae802d7782ae43
-
SHA256
fe3c9702699f9f4a4c5aa0067854a7b6ece468f3b77186e73056e491efb86611
-
SHA512
93f9ffaf8270139c40f294be283bd6996af11b1c4181447f2e09666fad7dda1abbb5af546a80909e5b17e182b385df0645b886745eb7039e960a86b7f7c97e0a
-
SSDEEP
384:7UqFYLsFGYokluqcAWf87MWu3U+0liAk:7YwGYoklqq7c3Uvl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0eab2a9ee6655d40747edb4b48251ff3_JaffaCakes118
Files
-
0eab2a9ee6655d40747edb4b48251ff3_JaffaCakes118.exe windows:5 windows x86 arch:x86
2af7446deb1c3f94f90d33dad47b595a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
exit
_cexit
_XcptFilter
_exit
_c_exit
_purecall
??3@YAXPAX@Z
_beginthreadex
??2@YAPAXI@Z
free
_endthreadex
atl
ord20
ord17
ord23
ord57
ord18
ord21
ord16
ord32
advapi32
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
kernel32
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
UnhandledExceptionFilter
GetTickCount
QueryPerformanceCounter
GetCommandLineW
lstrcmpiW
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoW
GetLastError
InterlockedCompareExchange
ExitProcess
UnregisterWait
CreateThread
RegisterWaitForSingleObject
GetCurrentProcessId
GetCurrentThreadId
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrlenW
SetEvent
CloseHandle
WaitForSingleObject
GetModuleFileNameW
CreateEventW
GetFullPathNameW
OpenProcess
user32
GetMessageW
DispatchMessageW
DestroyWindow
CharNextW
PostThreadMessageW
ole32
CoInitializeEx
CoInitializeSecurity
CoResumeClassObjects
CoUninitialize
CoSuspendClassObjects
CoCreateInstance
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 364B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE