earthflashsol.pdb
Static task
static1
Behavioral task
behavioral1
Sample
185a61e4f82159868dcacd326074b16d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
185a61e4f82159868dcacd326074b16d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
185a61e4f82159868dcacd326074b16d_JaffaCakes118
-
Size
49KB
-
MD5
185a61e4f82159868dcacd326074b16d
-
SHA1
cc377ae6da5b61366c781392a8831210f8f492fa
-
SHA256
d6d7e7a58320a7dbd204e2d95b4e264f1e0ec51c0d8f28a97c8eaa72d71383d9
-
SHA512
20514a8faed7fbb8d7dd5be85c985220208a6a09dfb34df7568168b3d39496ca918dca3975e75f0b4b2ee5f1d1c2021c80faf33547f51fe579879924807c44ac
-
SSDEEP
1536:Ghp6OFZyNlhZkM63Hvx5wrB6IjBOg3yQxdSoN2j:0p6syBZkM63JysIjBOgu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 185a61e4f82159868dcacd326074b16d_JaffaCakes118
Files
-
185a61e4f82159868dcacd326074b16d_JaffaCakes118.exe windows:4 windows x86 arch:x86
bf2348d4c6583a52da9490e2d6a17acf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcp80
?push_back@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXD@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@V32@D@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@D@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_WI@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?_Throw@std@@YAXABVexception@stdext@@@Z
?_Raise_handler@std@@3P6AXABVexception@stdext@@@ZA
msvcr80
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
_invoke_watson
_controlfp_s
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_wfsopen
memmove
wcscpy
strchr
wcslen
memset
_wcsnicmp
_wfopen
memmove_s
setvbuf
memcmp
_fileno
ftell
memcpy
_errno
fread
feof
_purecall
??_V@YAXPAX@Z
fseek
fwrite
isalpha
fclose
_invalid_parameter_noinfo
??3@YAXPAX@Z
strlen
??2@YAPAXI@Z
_fstat64i32
_strnicmp
kernel32
TlsSetValue
EnterCriticalSection
GetTempFileNameW
GetDiskFreeSpaceExW
GetProcAddress
CopyFileW
TlsAlloc
GetFileAttributesExW
RemoveDirectoryW
MultiByteToWideChar
LeaveCriticalSection
IsDebuggerPresent
FreeLibrary
CloseHandle
GetTickCount
DeleteCriticalSection
WideCharToMultiByte
GetModuleFileNameW
SetThreadPriority
MoveFileW
TlsFree
FindNextFileW
ResumeThread
TlsGetValue
FindClose
GetCurrentThreadId
DeleteFileW
CreateDirectoryW
CreateThread
GetFileAttributesW
GetLastError
GetTempPathW
GetDriveTypeW
LoadLibraryA
InitializeCriticalSection
WaitForSingleObject
GetLongPathNameW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FindFirstFileW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathW
ws2_32
getsockopt
WSACleanup
htonl
WSAResetEvent
sendto
inet_addr
WSAEnumNetworkEvents
setsockopt
connect
ioctlsocket
send
ntohl
WSACreateEvent
WSAGetLastError
recv
recvfrom
htons
socket
WSAStartup
getpeername
getsockname
gethostbyname
closesocket
WSASetEvent
ntohs
WSACloseEvent
WSAWaitForMultipleEvents
bind
WSAEventSelect
listen
accept
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 708B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ