d:\Desktop\Desktop\branches\13.0.16\bin\Win32\Release\bdsubwiz.pdb
Behavioral task
behavioral1
Sample
2cdced04c07731963dc35316667e2a15_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2cdced04c07731963dc35316667e2a15_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2cdced04c07731963dc35316667e2a15_JaffaCakes118
-
Size
766KB
-
MD5
2cdced04c07731963dc35316667e2a15
-
SHA1
6f9c4cea67bf438fff30fa58111541d83f1403f3
-
SHA256
debc912e9b62f8d8b44027c6f2a0792bab7ccaf953f0f5aa0b8b4aa27eb0af35
-
SHA512
a5f61af7b0fd66d3f865f4493153d91d2611ce4e447930ba94310fe171f990d0fb4d60d1df08f575f77104d40a7be7191ceb667fac476167d8b515bd48779bed
-
SSDEEP
6144:jJs2ytdORqXnstogo4nkC5C8oyOOGBwxWlpkVdZHTRNyKx3gn6:VsNXstogo4kkC8oyWBwWl6VQKZu6
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2cdced04c07731963dc35316667e2a15_JaffaCakes118
Files
-
2cdced04c07731963dc35316667e2a15_JaffaCakes118.exe windows:5 windows x86 arch:x86
f71e20774389dab7f8723139d6f6472a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
bdsubmit
ord18
ord3
ord2
ord1
ord22
ord15
ord21
ord14
ord17
ord19
txmlutil
?Value@TiXmlNode@@QBEPB_WXZ
?IterateChildren@CBDTinyXml@@QAEHPAVTiXmlElement@@P6A_NPBV2@@Z_N@Z
??0CBDTinyXml@@QAE@XZ
?GetText@TiXmlElement@@QBEPB_WXZ
?GetRootElement@CBDTinyXml@@QAEPAVTiXmlElement@@XZ
??1CBDTinyXml@@QAE@XZ
productinfo
?ReplaceVariables@CProductInfo@@QAEPB_WPA_WI@Z
?GetInstance@CProductInfo@@SAPAV1@XZ
mfc90u
ord3515
ord4682
ord5653
ord1492
ord6408
ord3353
ord1675
ord1809
ord1810
ord5324
ord5632
ord1254
ord3185
ord803
ord267
ord2141
ord5979
ord2479
ord938
ord6703
ord2695
ord3794
ord2283
ord1719
ord4660
ord3654
ord778
ord2280
ord4658
ord3252
ord3563
ord693
ord2274
ord1665
ord4652
ord3489
ord611
ord4262
ord4266
ord6355
ord6545
ord6547
ord6187
ord6096
ord3537
ord4631
ord5167
ord1064
ord2360
ord4319
ord4130
ord1354
ord3543
ord2106
ord2537
ord1183
ord3486
ord6091
ord1353
ord636
ord367
ord2069
ord6604
ord6275
ord2904
ord6808
ord6577
ord2597
ord1496
ord6579
ord5008
ord4000
ord1938
ord2143
ord750
ord3627
ord1708
ord1779
ord654
ord595
ord3528
ord4910
ord3286
ord3140
ord5650
ord1727
ord1791
ord1792
ord2139
ord5625
ord1442
ord3226
ord6376
ord5404
ord3682
ord6804
ord4174
ord6802
ord1641
ord2368
ord2375
ord2630
ord2612
ord2610
ord2628
ord2640
ord2617
ord2633
ord2638
ord2621
ord2623
ord2625
ord2619
ord2635
ord2615
ord971
ord967
ord969
ord965
ord960
ord5683
ord5685
ord6466
ord1728
ord4702
ord5154
ord3743
ord5664
ord4603
ord6800
ord5512
ord2074
ord5602
ord4664
ord1493
ord4345
ord1751
ord1754
ord6411
ord3355
ord639
ord374
ord1137
ord3589
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord2251
ord2206
ord6035
ord4179
ord1048
ord5548
ord6741
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord2447
ord4347
ord4996
ord5680
ord5663
ord6018
ord2771
ord2983
ord3112
ord4728
ord2966
ord3115
ord2774
ord2893
ord2764
ord4080
ord4081
ord4071
ord2891
ord4348
ord4905
ord4681
ord3670
ord811
ord261
ord5778
ord6822
ord2208
ord4211
ord909
ord813
ord286
ord4043
ord4967
ord1272
ord801
ord1250
ord265
ord589
ord600
ord296
ord794
ord799
ord266
ord1248
ord4490
msvcr90
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
fwprintf_s
setvbuf
_wfsopen
_vsnwprintf
memmove_s
__CxxFrameHandler3
_wtoi
swscanf_s
fgetws
vswprintf_s
fwrite
_wfopen_s
swprintf_s
fclose
_wcsupr_s_l
_wcslwr_s_l
_ui64tow_s
_wcstoui64
wcschr
wcsrchr
wcsncmp
_free_locale
_create_locale
wcslen
wcscmp
wcscat_s
wcscpy_s
wcsncpy_s
wcsstr
memcpy_s
free
memcpy
malloc
fflush
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
memset
kernel32
CreateThread
SetEvent
WaitForSingleObject
ResumeThread
GetFileAttributesW
GetCurrentProcess
CopyFileW
GetPrivateProfileIntW
LocalFree
FindResourceW
LoadResource
SizeofResource
FreeLibrary
LoadLibraryW
LockResource
OutputDebugStringW
FindResourceExW
EnterCriticalSection
RaiseException
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
Sleep
DeleteFileW
GetCommandLineW
GetLastError
InterlockedExchange
CloseHandle
lstrcpynW
GetModuleFileNameW
GetPrivateProfileStringW
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CreateFileW
GetFileSize
ReadFile
GetCurrentThreadId
GetCurrentProcessId
GetTickCount
FindFirstFileW
FindClose
SetFilePointer
WriteFile
SetEndOfFile
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
GetSystemTime
CreateDirectoryW
user32
CharLowerW
InvalidateRect
DrawTextW
GetWindowRect
GetDesktopWindow
GetClientRect
SendMessageW
EnableWindow
PostMessageW
GetDC
LoadBitmapW
wsprintfW
gdi32
CreateFontIndirectW
SelectObject
CreateDIBSection
DeleteDC
BitBlt
GetObjectW
DeleteObject
CreateCompatibleDC
advapi32
RegOpenKeyExW
RegOpenCurrentUser
RegCreateKeyExW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
RegQueryValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
shlwapi
PathIsRelativeW
UrlUnescapeW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 548KB - Virtual size: 547KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE