C:\Projects\counterspy\sdk\head\Build\bin\Release\SBPIMSvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1c7a69df378d7dcee26b377b561ac18b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1c7a69df378d7dcee26b377b561ac18b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1c7a69df378d7dcee26b377b561ac18b_JaffaCakes118
-
Size
169KB
-
MD5
1c7a69df378d7dcee26b377b561ac18b
-
SHA1
3af8ffb1c31f5144b51c7b44ce22978261ee9e84
-
SHA256
aaa3c8e79a4e1a92cd075da058756c7c4cdae5419bf20e2e1f88bb99e44d9243
-
SHA512
9fa77d562a17db80ac39a7222decf4623cbbd03a15da941c46c42cd534c7e89d42177fae3ae43292de6be869b409d37cf9ba1c9d9f86022d5d901ca43f3da3a8
-
SSDEEP
3072:JcmEivAqTK/uMkxb8anSqO4LekNDz4f6hIXx26fZC93rTFhh73:JcmEGAmK/i8aPOQekVzsiInC93Xt3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c7a69df378d7dcee26b377b561ac18b_JaffaCakes118
Files
-
1c7a69df378d7dcee26b377b561ac18b_JaffaCakes118.exe windows:6 windows x86 arch:x86
c00829cc4a1423ba97ea62783547aec6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
unrar
RAROpenArchiveEx
RARReadHeader
RARProcessFileW
RARCloseArchive
psapi
EmptyWorkingSet
kernel32
CreateThread
CreateEventW
InterlockedDecrement
SetEvent
MultiByteToWideChar
LoadLibraryExW
GetCommandLineW
GetDriveTypeW
LocalFree
FormatMessageW
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
Sleep
WriteFile
GetFileSize
CreateFileW
GetCurrentProcessId
QueryPerformanceCounter
GetLocalTime
GetStringTypeW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
GetCurrentThreadId
WaitForSingleObject
CloseHandle
GetCurrentProcess
lstrcmpiW
GetModuleHandleW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
lstrlenW
GetModuleFileNameW
CreateDirectoryW
FindFirstFileW
RemoveDirectoryW
DeleteFileW
FindNextFileW
FindClose
LoadLibraryW
GetProcAddress
MoveFileW
FreeLibrary
GetLastError
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
SetEnvironmentVariableA
SetEndOfFile
ReadFile
GetTimeZoneInformation
WriteConsoleW
CompareStringW
SetFilePointer
SetStdHandle
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameW
GetTickCount
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapCreate
GetStdHandle
ExitProcess
IsProcessorFeaturePresent
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RtlUnwind
GetFileAttributesW
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExW
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
TlsAlloc
TlsGetValue
user32
LoadStringW
CharNextW
CharUpperW
TranslateMessage
DispatchMessageW
GetMessageW
SetTimer
MessageBoxW
PostThreadMessageW
advapi32
InitializeAcl
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
MakeSelfRelativeSD
GetLengthSid
AddAccessAllowedAce
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
ControlService
DeleteService
CreateServiceW
RegEnumKeyExW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
OpenSCManagerW
OpenServiceW
CloseServiceHandle
SetServiceStatus
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
shell32
SHGetFolderPathW
ole32
CoCreateInstance
CoReleaseServerProcess
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoAddRefServerProcess
CoInitialize
CoUninitialize
StringFromGUID2
CoTaskMemFree
oleaut32
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysFreeString
VarUI4FromStr
RegisterTypeLi
SysAllocString
shlwapi
PathFileExistsW
PathRemoveExtensionW
PathRemoveFileSpecW
Sections
.text Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ