dpvsetup.pdb
Behavioral task
behavioral1
Sample
2c0a375e112306661ab76b4beeb48466_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c0a375e112306661ab76b4beeb48466_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c0a375e112306661ab76b4beeb48466_JaffaCakes118
-
Size
225KB
-
MD5
2c0a375e112306661ab76b4beeb48466
-
SHA1
23fa8de8f5b972154729cc232da550119bd8f1d2
-
SHA256
63a75d0f89c6c044e58f89b313bae44e1d9745964cdf1fb6bf89538c44649e48
-
SHA512
c2320b63beb2e83ea8bbd4be8900e3c1d843f579abab4a666a4f3b025e8d5ab792823d368dc1486ab50db2dab0356eedb3d3b2a796972f9be3b9582d4a65a506
-
SSDEEP
6144:6vr3c4kTgn/PYLsoiLz219aWvcve6lLoIP4w+u:krs4kTSPUiLzWa2seUhD+u
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c0a375e112306661ab76b4beeb48466_JaffaCakes118
Files
-
2c0a375e112306661ab76b4beeb48466_JaffaCakes118.exe windows:5 windows x86 arch:x86
2c6061d87998b06854da5d86c2d6bdec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
__set_app_type
_controlfp
__dllonexit
_onexit
__p__fmode
__p__commode
fopen
_XcptFilter
_exit
_adjust_fdiv
_except_handler3
wcstok
swprintf
srand
_wcsnicmp
wcsncat
wcslen
wcsncpy
fclose
fflush
_vsnprintf
fputs
vfprintf
__setusermatherr
_initterm
__getmainargs
_acmdln
_cexit
_c_exit
exit
_wcsicmp
kernel32
GetStartupInfoA
ReleaseMutex
CreateFileMappingW
HeapFree
UnmapViewOfFile
CreateEventW
CreateThread
WaitForMultipleObjects
CreateMutexW
SetEvent
WaitForSingleObject
TerminateThread
GetExitCodeThread
GetModuleHandleA
GetExitCodeProcess
CloseHandle
CreateProcessW
Sleep
GetVersionExW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
GetProcessHeap
HeapAlloc
OpenFileMappingW
OpenEventW
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FreeLibrary
GetCommandLineW
GetSystemDirectoryW
LoadLibraryA
MapViewOfFile
lstrcpyW
GetLastError
GetProcAddress
LoadLibraryW
DeleteCriticalSection
LeaveCriticalSection
user32
GetWindowRect
LoadStringW
LoadCursorW
GetSysColorBrush
RegisterClassW
InvalidateRgn
DefWindowProcW
GetClientRect
BeginPaint
EndPaint
UnregisterClassW
GetDesktopWindow
GetWindowLongW
EnableWindow
DialogBoxParamW
IsWindow
GetParent
GetDlgItem
EndDialog
LoadIconW
SendDlgItemMessageW
MessageBoxW
PostMessageW
SetWindowLongW
SystemParametersInfoW
GetDC
ReleaseDC
SendMessageW
EnumWindows
GetSystemMetrics
SetForegroundWindow
GetWindowThreadProcessId
GetClassNameW
SetWindowPos
winmm
waveInGetDevCapsA
PlaySoundW
waveOutGetDevCapsW
waveOutSetVolume
waveOutGetVolume
mixerGetID
waveOutGetDevCapsA
waveInGetDevCapsW
timeGetTime
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
StringFromGUID2
advapi32
RegSetValueExW
RegFlushKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
gdi32
MoveToEx
LineTo
Rectangle
GetStockObject
CreateSolidBrush
CreatePen
GetDeviceCaps
CreateFontIndirectW
DeleteObject
SelectObject
dsound
ord1
comctl32
ord17
CreatePropertySheetPageW
PropertySheetW
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE