c:\Proj\HPSHREDDER\SRC\HPFSService\Release\HPFSService.pdb
Static task
static1
Behavioral task
behavioral1
Sample
18af741cd8776015720bdb675dd9e6f3_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
18af741cd8776015720bdb675dd9e6f3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
18af741cd8776015720bdb675dd9e6f3_JaffaCakes118
-
Size
363KB
-
MD5
18af741cd8776015720bdb675dd9e6f3
-
SHA1
92c1c685798cb416ed5de712d63fbf625c98296e
-
SHA256
7d819b4ac67cde2e00dd4d8847bb1042bc255f0851092e587dd2dcbff5ba8c44
-
SHA512
6e963f1a5429cd00003d9ba59e158cfb72ce2861b6333a22577baa10cf42c92c8f77224e225ba3d1bca619958dc73c5b28ae1bc0bc687b280b806bbaaa7beafe
-
SSDEEP
6144:Eepy4FxGxr6U1gQylmLLREguefUdGaVoeHGMBn8U+cK9g4:EeSr6kUlmfREguesdz5Hf49L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18af741cd8776015720bdb675dd9e6f3_JaffaCakes118
Files
-
18af741cd8776015720bdb675dd9e6f3_JaffaCakes118.exe windows:5 windows x86 arch:x86
65a973a564d901df29bb230e514c19ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
GetUserNameW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
StartServiceCtrlDispatcherW
OpenSCManagerW
CreateServiceW
CloseServiceHandle
OpenServiceW
ControlService
QueryServiceStatus
DeleteService
RegisterServiceCtrlHandlerW
SetServiceStatus
ConvertStringSecurityDescriptorToSecurityDescriptorW
DuplicateToken
ImpersonateLoggedOnUser
RevertToSelf
kernel32
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
lstrcmpA
lstrlenA
GlobalFlags
InterlockedExchange
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
RtlUnwind
ExitThread
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
InitializeCriticalSection
GetFileType
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
SetEnvironmentVariableW
GetProcessHeap
CreateFileA
GetProcAddress
FindResourceW
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LoadResource
SizeofResource
LoadLibraryW
RaiseException
LockResource
lstrlenW
GetVersionExW
CloseHandle
CreateFileW
FindFirstFileW
FindNextFileW
FindClose
GetLastError
FormatMessageW
GetLocalTime
MoveFileW
DeviceIoControl
SetHandleCount
SetFilePointer
SetEndOfFile
DeleteFileW
GetDiskFreeSpaceW
VirtualAlloc
VirtualFree
OutputDebugStringW
SetFilePointerEx
WriteFile
CreateDirectoryW
GetDiskFreeSpaceExW
FlushFileBuffers
RemoveDirectoryW
SetFileAttributesW
SetCurrentDirectoryW
GetCurrentDirectoryW
InterlockedDecrement
MultiByteToWideChar
ReadFile
CreateThread
SetEvent
LocalAlloc
InterlockedIncrement
SuspendThread
ResumeThread
GetModuleHandleA
FreeResource
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GetModuleHandleW
WideCharToMultiByte
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
WaitForSingleObject
GetFullPathNameW
GetTickCount
WTSGetActiveConsoleSessionId
GetCurrentThreadId
GetCurrentProcessId
FreeLibrary
GetCurrentProcess
IsWow64Process
LocalFree
lstrcatW
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeW
WaitForMultipleObjects
CreateEventW
Sleep
GetModuleFileNameW
user32
GetSysColorBrush
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
DestroyMenu
GetWindowThreadProcessId
EndPaint
BeginPaint
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
EnableMenuItem
CheckMenuItem
ReleaseDC
GetDC
ShowWindow
SetWindowTextW
IsDialogMessageW
GetDesktopWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
IsWindowVisible
UpdateWindow
GetClientRect
PostMessageW
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
GetParent
SetWindowLongW
SendMessageW
PostQuitMessage
GetActiveWindow
LoadCursorW
EnableWindow
wsprintfW
SetForegroundWindow
GetWindowTextW
GetSystemMenu
ModifyMenuW
GetWindow
PostThreadMessageW
LoadIconW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
SetFocus
IsWindow
IsWindowEnabled
GetSysColor
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcW
CopyRect
PtInRect
GetMenu
GetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
RegisterWindowMessageW
GetFocus
gdi32
GetObjectW
CreateBitmap
SaveDC
RestoreDC
SetMapMode
DeleteObject
GetClipBox
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SetBkColor
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
CreateFontIndirectW
DPtoLP
SelectObject
SetTextColor
GetDeviceCaps
CreateSolidBrush
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
shell32
ShellExecuteW
SHGetFolderPathW
SHFileOperationW
shlwapi
PathIsDirectoryW
SHDeleteKeyW
SHDeleteValueW
PathFindExtensionW
PathRemoveExtensionW
ole32
CoTaskMemFree
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 209KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 81KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ