C:\OUT\Release\PDB\bitcoin-miner.pdb
Static task
static1
Behavioral task
behavioral1
Sample
30343530004319e863f28baf88575e2e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
30343530004319e863f28baf88575e2e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
30343530004319e863f28baf88575e2e_JaffaCakes118
-
Size
706KB
-
MD5
30343530004319e863f28baf88575e2e
-
SHA1
832acf8fc8fcc02c5606a3a458755791825b0efc
-
SHA256
e865dab9576988d27518eb6f12c7186b38ad55de3bb44369cf222417a0447996
-
SHA512
c92675ba0ab4fb96336f7db2b9c05eedb201f1dd2f3ba3f80a0d1483d8714f6f4678a06ae222ad69df0d6c3b2aa0eeb6b9e7c8fb0d38f03fa15779142979b0cf
-
SSDEEP
6144:+AKeKGKaKOtkJJKpJ1lJLKprs3tqqqqCqCqqqsq57iqyCqygazFMUIPQIrFUDeTA:f3JzNIxrOeacE0oYWN5UtE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30343530004319e863f28baf88575e2e_JaffaCakes118
Files
-
30343530004319e863f28baf88575e2e_JaffaCakes118.exe windows:5 windows x86 arch:x86
63a72780f4d7f8a0af83dd1f4b4e512b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
printf
_stat
_fstat
_vsnwprintf
toupper
isalpha
_sys_nerr
_getcwd
_controlfp
__set_app_type
_purecall
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
__fpecode
vsprintf
strncpy
_findnexti64
_findfirsti64
_fstati64
_stati64
ctime
gmtime
localtime
mktime
time
_ftime
_utime
strncmp
getenv
fprintf
__argc
__argv
__wargv
signal
raise
_findnext
_findfirst
_iob
strtod
isxdigit
isdigit
fputc
_pclose
fopen
setvbuf
sscanf
strstr
strftime
_open_osfhandle
_fdopen
fseek
fsetpos
fgetpos
fflush
fwrite
fread
feof
fgetc
ferror
ungetc
fclose
_get_osfhandle
_wsplitpath
_findclose
_beginthreadex
_endthreadex
_assert
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
isspace
isalnum
strchr
ldexp
_errno
strerror
memchr
iswspace
wcschr
memmove
realloc
malloc
_msize
free
sprintf
abort
_EH_prolog
_vsnprintf
atoi
memcpy
_fileno
_isatty
memset
?terminate@@YAXXZ
user32
CharToOemW
PostThreadMessageW
MessageBoxW
MessageBeep
EnumWindows
LoadStringW
GetSysColor
GetWindowLongW
GetWindowThreadProcessId
IsCharAlphaW
IsCharUpperW
IsCharLowerW
CharLowerW
CharUpperW
ole32
CoTaskMemAlloc
CLSIDFromString
StringFromGUID2
CoCreateGuid
CoUninitialize
CoFreeUnusedLibraries
CoTaskMemFree
CLSIDFromProgID
StringFromIID
StgCreateDocfile
StgOpenStorage
CoInitialize
CoCreateInstance
StringFromCLSID
oleaut32
SafeArrayGetElement
SysAllocStringByteLen
SysAllocString
VarDateFromStr
VariantInit
SysFreeString
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetVartype
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysStringByteLen
VariantCopyInd
VariantCopy
VariantClear
VariantChangeType
SafeArrayGetLBound
SafeArrayCreate
SafeArrayPutElement
SafeArrayRedim
wininet
InternetConnectW
InternetOpenUrlW
InternetCrackUrlW
InternetOpenW
InternetGetLastResponseInfoW
InternetSetFilePointer
InternetCloseHandle
HttpSendRequestExW
InternetSetOptionW
InternetQueryOptionW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetWriteFile
InternetReadFile
HttpQueryInfoW
HttpEndRequestW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
shlwapi
PathIsUNCW
PathStripToRootW
advapi32
GetUserNameW
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegLoadKeyW
RegSaveKeyW
RegUnLoadKeyW
RegSetValueExW
RegQueryValueExW
RegFlushKey
RegDeleteValueW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegCloseKey
kernel32
ReleaseSemaphore
ReleaseMutex
CreateSemaphoreW
OpenMutexW
CreateMutexW
CreateEventW
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
TryEnterCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
VirtualQuery
VirtualQueryEx
GetCurrentProcessId
VirtualProtect
VirtualProtectEx
GetProcessVersion
GetProcessTimes
WriteProcessMemory
ReadProcessMemory
ResetEvent
ConnectNamedPipe
WaitForSingleObjectEx
WaitForSingleObject
CreateProcessW
CreateNamedPipeW
SetLastError
GetCurrentThread
GetModuleHandleW
FormatMessageW
FreeLibrary
ExpandEnvironmentStringsW
SetEnvironmentVariableW
GetEnvironmentVariableW
GetSystemDirectoryW
GetComputerNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemInfo
GetVersionExW
WideCharToMultiByte
ExitProcess
GetCurrentProcess
DuplicateHandle
OutputDebugStringA
GetCurrentThreadId
InterlockedCompareExchange
CloseHandle
LoadLibraryW
SetEvent
SizeofResource
LeaveCriticalSection
EnterCriticalSection
GetLastError
TlsGetValue
Sleep
GetProcAddress
HeapSize
HeapAlloc
GetStdHandle
FindClose
FindFirstFileW
FindNextFileW
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
HeapFree
LockResource
LoadResource
FreeResource
QueryDosDeviceW
IsDebuggerPresent
GetLogicalDriveStringsW
GetOverlappedResult
FindResourceW
LocalAlloc
LocalFree
UnhandledExceptionFilter
TerminateProcess
GetTickCount
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LoadLibraryA
InterlockedExchange
TlsAlloc
TlsFree
TlsSetValue
WaitForMultipleObjects
SleepEx
RaiseException
GetExitCodeThread
GetThreadPriority
SetThreadPriority
RtlUnwind
GetCommandLineW
GetTimeZoneInformation
FileTimeToSystemTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetSystemTimeAsFileTime
RemoveDirectoryW
SetFileTime
DeleteFileW
GetLongPathNameW
CreateFileMappingW
MapViewOfFile
GetFileSize
FlushFileBuffers
SetFilePointer
SetEndOfFile
DeviceIoControl
WriteFile
ReadFile
CreateDirectoryW
GetTempFileNameW
UnmapViewOfFile
SetCurrentDirectoryW
GetCurrentDirectoryW
GetFullPathNameW
GetVolumeInformationW
lstrcpyW
lstrcpynW
CreateFileW
MoveFileW
CopyFileW
GetFileAttributesW
GetTempPathW
MultiByteToWideChar
QueueUserAPC
SuspendThread
ResumeThread
GetThreadTimes
SetThreadContext
GetThreadContext
OpenProcess
Exports
Exports
??4CFunTrace@Ext@@QAEAAV01@ABV01@@Z
??4CLocalIgnore@Ext@@QAEAAV01@ABV01@@Z
?read@istream@ExtSTL@@QAEAAV12@PAC_J@Z
?read@istream@ExtSTL@@QAEAAV12@PAE_J@Z
?write@ostream@ExtSTL@@QAEAAV12@PBC_J@Z
?write@ostream@ExtSTL@@QAEAAV12@PBE_J@Z
API__fstat32
API_strtoi64
API_strtoui64
API_wassert
My_EH_prolog2
My_SEH_epilog
My_SEH_epilog4
My_SEH_prolog
My_SEH_prolog4
My__ehvec_copy_ctor
My_except_handler3
My_except_handler4
_My_CxxThrowException@8
_My__CxxSetUnhandledExceptionFilter@0
__CxxFrameHandler3
_recalloc
_resetstkoflw
_snprintf_s
_snwprintf_s
_stat32
_vsnprintf_s
_vsnwprintf_s
memmove_s
my__report_gsfailure
my_aligned_free
my_aligned_malloc
my_memmove_s
my_recalloc
my_resetstkoflw
my_wcsncpy_s
pcre_callout
pcre_compile
pcre_compile2
pcre_copy_named_substring
pcre_copy_substring
pcre_exec
pcre_free
pcre_free_substring
pcre_free_substring_list
pcre_fullinfo
pcre_get_named_substring
pcre_get_stringnumber
pcre_get_stringtable_entries
pcre_get_substring
pcre_get_substring_list
pcre_malloc
pcre_stack_free
pcre_stack_malloc
wcsncpy_s
Sections
.text Size: 310KB - Virtual size: 309KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 273KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ