rdrleakdiag.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1946794d5819a0dfcd8dd88394163fb5_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1946794d5819a0dfcd8dd88394163fb5_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1946794d5819a0dfcd8dd88394163fb5_JaffaCakes118
-
Size
62KB
-
MD5
1946794d5819a0dfcd8dd88394163fb5
-
SHA1
c5890cf7eef3619c4102027e2a52ffc9b79b60cd
-
SHA256
f7f4f180836e884e59105e37195f7110ab95c4556d1a1eec153b6c948cced60e
-
SHA512
a84268273b8ff4d7debc65ffbb938d4b61b36bbeaca39ccc63bbcbce9f5b7fc726ee528f166353359934938a67faa22b9bd9b8459a48b74d9239ad83635b5fe0
-
SSDEEP
1536:lKdUJT2snaNUHO7Bn3ZoMKyYTw4TTTTTTTTyMqKNHzZ5CQ:l8qNna4O7BnpoMKy+b53
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1946794d5819a0dfcd8dd88394163fb5_JaffaCakes118
Files
-
1946794d5819a0dfcd8dd88394163fb5_JaffaCakes118.exe windows:6 windows x86 arch:x86
a4ef62bd2c2df3ac401c7010c2cfa347
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
TraceMessage
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
EventWrite
EnumServicesStatusExW
OpenSCManagerW
QueryServiceConfigW
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenServiceW
kernel32
IsWow64Process
ReadProcessMemory
UnmapViewOfFile
CloseHandle
CreateFileW
HeapFree
GetVersionExW
HeapAlloc
GetProcessHeap
GetLastError
GetModuleHandleW
K32GetModuleFileNameExW
MapViewOfFile
CreateFileMappingW
WaitForMultipleObjects
GetCurrentProcess
WaitForSingleObject
SetProcessShutdownParameters
SetConsoleCtrlHandler
GetProcessTimes
CreateDirectoryW
DeleteFileW
GetTempFileNameW
GetTempPathW
HeapSetInformation
LoadLibraryW
GetProcAddress
FreeLibrary
GetSystemTimeAsFileTime
SetFilePointer
GetProcessId
GetModuleFileNameW
LocalAlloc
LocalFree
SetLastError
OpenProcess
UnhandledExceptionFilter
TerminateProcess
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
WriteFile
GetCurrentProcessId
RemoveDirectoryW
user32
LoadStringW
msvcrt
_wtol
_wcsicmp
memcpy
memset
qsort
wcsrchr
__wgetmainargs
_cexit
_exit
_XcptFilter
_vsnwprintf
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
exit
ntdll
RtlReleaseSRWLockExclusive
NtSetEvent
RtlAcquireSRWLockExclusive
RtlAllocateHeap
NtClose
NtQueryInformationThread
NtWaitForSingleObject
EtwEventUnregister
EtwEventRegister
RtlNtStatusToDosError
NtCreateMutant
NtResetEvent
NtCreateEvent
RtlCreateProcessReflection
NtReleaseMutant
NtQueryInformationProcess
NtDuplicateObject
NtOpenProcess
NtCreateThreadEx
RtlInitUnicodeString
RtlEqualUnicodeString
RtlFreeHeap
wer
WerReportAddFile
WerReportSetParameter
WerReportCreate
WerReportSubmit
WerReportCloseHandle
shlwapi
ord348
dbghelp
MiniDumpWriteDump
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wubphcg Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE