N:\HostAudio\setuphlp\objfre_w2K_x86\i386\suhlp.pdb
Behavioral task
behavioral1
Sample
147516c45f4a9de5981156957dbecb53_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
147516c45f4a9de5981156957dbecb53_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
147516c45f4a9de5981156957dbecb53_JaffaCakes118
-
Size
265KB
-
MD5
147516c45f4a9de5981156957dbecb53
-
SHA1
a918c9e013092a4e9ef028c3cf1dd5b77a1ce783
-
SHA256
13a5f9d955d00c193cbef8ef6488db1b3003e4270623a329bda51a40b6808df9
-
SHA512
4156da2bc229d59c91977fb7f509b066a55368e48a8f061b4ba10702fff08c2480d04c8711ad5803f8dc663b6c292d2c44e49616cac402e3de16a2e7a44327a4
-
SSDEEP
384:fI69K3ZnNDK2voN9jpAQ+VqEK417Pb2lnxeZACsLDAm4Y2WitvpGlm:Q69E1Nmj+VqEPPylnSACOB52Ntvt
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 147516c45f4a9de5981156957dbecb53_JaffaCakes118
Files
-
147516c45f4a9de5981156957dbecb53_JaffaCakes118.exe windows:5 windows x86 arch:x86
6cae57dfd4b93812cb6f2b4d8e4aa66a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExA
RegCloseKey
kernel32
CopyFileA
SetFileAttributesA
lstrcatA
lstrlenA
ExpandEnvironmentStringsA
lstrcpyA
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetModuleFileNameA
GetModuleHandleA
FindClose
FindNextFileA
GetFullPathNameA
FindFirstFileA
lstrcmpiA
LocalAlloc
GetLastError
LocalFree
FormatMessageA
GlobalFree
GlobalAlloc
DeleteFileA
GetSystemWindowsDirectoryA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
ExitProcess
GetProcAddress
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
Sleep
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
user32
CreateWindowExA
UpdateWindow
DestroyWindow
ShowWindow
IsWindow
setupapi
CM_Get_DevNode_Status
SetupDiGetClassDevsA
SetupDiRemoveDevice
SetupDiOpenDevRegKey
SetupGetInfInformationA
SetupQueryInfVersionInformationA
CM_Locate_DevNodeA
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyA
SetupDiEnumDeviceInfo
CM_Reenumerate_DevNode
newdev
UpdateDriverForPlugAndPlayDevicesA
shell32
SHGetFolderPathA
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 239KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE