dmadmin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2163d0ff953f1fe23f0b0ea2bc9bddb8_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2163d0ff953f1fe23f0b0ea2bc9bddb8_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2163d0ff953f1fe23f0b0ea2bc9bddb8_JaffaCakes118
-
Size
363KB
-
MD5
2163d0ff953f1fe23f0b0ea2bc9bddb8
-
SHA1
d52af8a99b5d01c15866601ed0f3227d0514ee84
-
SHA256
8a84e3d47c5cae50cd15bbe28e6abb6dbdd5bc762e6d60bb06a3f4b38b389af4
-
SHA512
0019440c68ac2252308cb2a4ec41340880360c52517722726922859eb294bda8df8503d4ebb34f975a6187e5bcec90d628fa3bdabdf16040760e9c9dbaab647f
-
SSDEEP
6144:KL3Si2xLwgxYv/srWpAVs5uPD6h9L4PjcsKVTuIQq9fEMWgFEuYVoy2cYUj2y31:PxLVMsCpn5K6hV4LAT1TFEMPFELoy2c3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2163d0ff953f1fe23f0b0ea2bc9bddb8_JaffaCakes118
Files
-
2163d0ff953f1fe23f0b0ea2bc9bddb8_JaffaCakes118.exe windows:5 windows x86 arch:x86
059c8b5c9fcbb1ab63e14cae9688b3fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
malloc
free
wcscmp
wcsncmp
__CxxFrameHandler
??2@YAPAXI@Z
sprintf
strstr
swprintf
wcscat
??3@YAXPAX@Z
exit
wcsstr
wcslen
wcscpy
mbstowcs
_wcsupr
memmove
wcsrchr
towupper
wcsncpy
fclose
fflush
mbtowc
__mb_cur_max
fopen
wcschr
_c_exit
_exit
_XcptFilter
_cexit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
advapi32
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyW
InitiateSystemShutdownW
RegCreateKeyExW
RegSetValueExW
RegUnLoadKeyW
RegLoadKeyW
RegOpenKeyExW
RegQueryValueExW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegisterServiceCtrlHandlerW
LookupPrivilegeValueW
PrivilegeCheck
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
OpenThreadToken
OpenProcessToken
SetServiceStatus
StartServiceCtrlDispatcherW
RegDeleteKeyW
kernel32
FindClose
GetFileAttributesW
lstrlenA
InterlockedIncrement
ExitThread
GetProcAddress
FreeLibrary
TerminateThread
DeleteVolumeMountPointW
SetVolumeMountPointW
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
LoadLibraryW
ResumeThread
CreateFileA
LocalAlloc
GetComputerNameW
IsBadCodePtr
FindFirstFileW
lstrcpyA
IsBadWritePtr
GetSystemDirectoryW
GetComputerNameExW
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
SetEndOfFile
SetFilePointerEx
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
CompareStringW
GetCurrentThreadId
InterlockedDecrement
SetLastError
HeapAlloc
GetProcessHeap
HeapFree
QueryDosDeviceW
DeviceIoControl
CloseHandle
CreateFileW
DefineDosDeviceW
GetDriveTypeW
Sleep
LocalFree
GetLastError
lstrcmpiA
SetEvent
lstrcmpW
lstrlenW
FormatMessageW
GetModuleHandleW
CreateEventW
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentThread
CreateThread
SetErrorMode
InitializeCriticalSection
DeleteCriticalSection
IsBadStringPtrW
IsBadReadPtr
lstrcpyW
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
lstrcatW
GetVolumePathNamesForVolumeNameW
user32
PostThreadMessageW
GetMessageW
TranslateMessage
DispatchMessageW
LoadIconW
LoadCursorW
RegisterClassW
CreateWindowExW
ShowWindow
DefWindowProcW
BroadcastSystemMessageW
PostMessageW
DestroyWindow
wsprintfW
LoadStringW
PostQuitMessage
ntdll
NtFlushBuffersFile
NtDeviceIoControlFile
NtQueryVolumeInformationFile
NtQuerySystemTime
RtlAdjustPrivilege
RtlExtendedLargeIntegerDivide
NtQuerySystemInformation
RtlFreeUnicodeString
NtOpenFile
RtlCreateUnicodeString
NtFsControlFile
NtWriteFile
NtReadFile
NtDeleteBootEntry
NtTranslateFilePath
NtEnumerateBootEntries
NtModifyBootEntry
NtQuerySymbolicLinkObject
RtlExtendedIntegerMultiply
RtlInitUnicodeString
NtOpenSymbolicLinkObject
NtClose
ole32
CoSuspendClassObjects
CoRevertToSelf
CoImpersonateClient
CoTaskMemAlloc
CoSetProxyBlanket
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoRevokeClassObject
CoRegisterClassObject
CoInitializeSecurity
CoInitializeEx
rpcrt4
RpcServerUseProtseqEpW
RpcServerRegisterIf
RpcServerListen
RpcMgmtStopServerListening
RpcServerUnregisterIf
UuidFromStringW
UuidEqual
UuidCreate
RpcImpersonateClient
RpcRevertToSelf
NdrServerCall2
setupapi
SetupDiGetDeviceInterfaceDetailW
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
CM_Locate_DevNodeW
CM_Get_Device_IDW
CM_Get_Device_ID_Size_Ex
CM_Get_DevNode_Status_Ex
SetupDiOpenDeviceInterfaceW
SetupDiCreateDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiOpenDeviceInfoW
CM_Get_Parent_Ex
CM_Get_Device_ID_List_ExW
CM_Get_Device_ID_List_Size_ExW
SetupDiEnumDeviceInterfaces
CM_Reenumerate_DevNode_Ex
clusapi
GetNodeClusterState
dmutil
AddEntryBootFileGpt
LowNtWriteFile
LowNtReadFile
LowNtReadOnlyAttributeOff
GetSystemVolume
GetInstallDirectoryPath
LowAcquirePrivilege
DynamicSupport
FreeRgszw
RgszwFromArgs
RgszwFromValist
RgszwDupRgszw
GetErrorData
AddEntryBootFileMbr
TranslateError
osuninst
IsUninstallImageValid
Sections
.text Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE