f:\Saazondemand\Agents\Dot_Net\Saazdpmactl\Saazdpmactl\Release\SAAZDPMACTL.pdb
Behavioral task
behavioral1
Sample
186dbe81f099ac9856d1faf6d9e24c14_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
186dbe81f099ac9856d1faf6d9e24c14_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
186dbe81f099ac9856d1faf6d9e24c14_JaffaCakes118
-
Size
224KB
-
MD5
186dbe81f099ac9856d1faf6d9e24c14
-
SHA1
f62763849fbe550e19f05b902544b6d75fb16e15
-
SHA256
53cd2f72cae2612621efb65966f1a1aea9fa978bae20997d55552b57f6390a0b
-
SHA512
554d8b19b97f16401b281c5579478bb9282054c676096b4c3991c208c39be1e1ede0a3acc0f4e233abbd28f26425e4148280e359cd77ddb21e90080dfd07a9b3
-
SSDEEP
3072:0bkQqcHeJi24vHr+DDNbWIio3OMYlCdZUf/lbNJEKFjXgS5MOXw3693a:0bfqMR2F3MCrUfBEAbgS5lwO
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 186dbe81f099ac9856d1faf6d9e24c14_JaffaCakes118
Files
-
186dbe81f099ac9856d1faf6d9e24c14_JaffaCakes118.exe windows:4 windows x86 arch:x86
f89edc0568b7bd1760cd71584696ec52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
EnumProcesses
GetModuleFileNameExA
kernel32
SetFilePointer
DeleteFileA
GetFileSize
CreateFileA
lstrcatA
ReleaseMutex
WaitForSingleObject
CreateMutexA
LocalFree
FormatMessageA
GetExitCodeProcess
WaitForMultipleObjects
GetPrivateProfileStringA
WritePrivateProfileStringA
FindClose
FindFirstFileA
SetEvent
TerminateThread
CreateThread
WriteFile
GetComputerNameA
GetCurrentProcess
ResetEvent
CreateEventA
SetCurrentDirectoryA
GetModuleFileNameA
GetTickCount
InterlockedExchange
GetACP
GetLocaleInfoA
GetVersionExA
InitializeCriticalSection
DeleteCriticalSection
FlushFileBuffers
lstrlenA
OpenProcess
lstrcpyA
lstrcmpiA
TerminateProcess
CreateProcessA
CloseHandle
Sleep
SetFileAttributesA
CreateDirectoryA
GetLastError
GetLocalTime
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleA
HeapFree
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
VirtualQuery
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
LoadLibraryA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
VirtualProtect
GetSystemInfo
LCMapStringA
LCMapStringW
advapi32
QueryServiceStatus
StartServiceA
ControlService
DeleteService
CreateServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
OpenProcessToken
CreateProcessAsUserA
SetServiceStatus
LookupPrivilegeValueA
AdjustTokenPrivileges
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE