wextract.pdb
Static task
static1
Behavioral task
behavioral1
Sample
32881867f46497b5a8db4081d4e8e267_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32881867f46497b5a8db4081d4e8e267_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
32881867f46497b5a8db4081d4e8e267_JaffaCakes118
-
Size
2.3MB
-
MD5
32881867f46497b5a8db4081d4e8e267
-
SHA1
183b01872a9d1200bbde8dfbe88a61c997a50b16
-
SHA256
9fd050b81dc2c947a7dc91be54232a34dab8149c4f59269f4164b42af73747e0
-
SHA512
d9aadd0066f60e61a30aaf0c5a637c701f90ccb05e8e6a04adff8b19b7ae08cc18fbc08159502c123ce0dbde6ad004f2e85b81cecf13952d0c4c1d93942a351d
-
SSDEEP
49152:UIeqxOG0vF2RYccaFSF+gwH5M+ULUSQeYjqyLDLU+Z4:QqxR0tkYccaFSFEebLQ1jqMUO4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32881867f46497b5a8db4081d4e8e267_JaffaCakes118
Files
-
32881867f46497b5a8db4081d4e8e267_JaffaCakes118.exe windows:6 windows x64 arch:x64
cec1353db02cef3ba786bd9d04bff5a5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryInfoKeyA
GetTokenInformation
FreeSid
RegSetValueExA
LookupPrivilegeValueA
RegDeleteValueA
RegCreateKeyExA
AllocateAndInitializeSid
EqualSid
RegQueryValueExA
RegOpenKeyExA
OpenProcessToken
AdjustTokenPrivileges
kernel32
WritePrivateProfileStringA
LocalFree
FindFirstFileA
_lclose
DeleteFileA
lstrlenA
GetLastError
GetFileAttributesA
ExpandEnvironmentStringsA
GetProcAddress
_llseek
GetWindowsDirectoryA
RemoveDirectoryA
IsDBCSLeadByte
GetSystemDirectoryA
FreeLibrary
GetModuleFileNameA
FindNextFileA
SetFileAttributesA
GlobalFree
GetCurrentProcess
FindClose
GetPrivateProfileStringA
CompareStringA
LoadLibraryA
GlobalAlloc
GlobalUnlock
GlobalLock
GetPrivateProfileIntA
_lopen
GetShortPathNameA
LoadLibraryExA
ExitProcess
CloseHandle
GetCurrentDirectoryA
WriteFile
DosDateTimeToFileTime
SetCurrentDirectoryA
CreateFileA
FindResourceA
GetDriveTypeA
GetVersionExA
SetFilePointer
GetVersion
FreeResource
GetTempPathA
GetTempFileNameA
CreateThread
ResetEvent
LocalFileTimeToFileTime
CreateDirectoryA
TerminateThread
LoadResource
SizeofResource
CreateEventA
GetExitCodeProcess
LockResource
WaitForSingleObject
CreateProcessA
SetEvent
ReadFile
GetSystemInfo
GetModuleHandleW
FormatMessageA
SetFileTime
Sleep
CreateMutexA
lstrcmpA
LocalAlloc
GetStartupInfoW
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
EnumResourceLanguagesA
MulDiv
GetDiskFreeSpaceA
GetVolumeInformationA
gdi32
GetDeviceCaps
user32
CallWindowProcA
PeekMessageA
EnableWindow
SetWindowTextA
DispatchMessageA
MessageBoxA
SetForegroundWindow
SetWindowLongPtrA
MsgWaitForMultipleObjects
ShowWindow
DialogBoxIndirectParamA
GetDlgItemTextA
GetDlgItem
SendMessageA
GetWindowRect
GetWindowLongPtrA
SendDlgItemMessageA
GetDC
SetWindowPos
SetDlgItemTextA
MessageBeep
CharUpperA
EndDialog
CharNextA
GetDesktopWindow
ExitWindowsEx
CharPrevA
LoadStringA
ReleaseDC
GetSystemMetrics
msvcrt
__set_app_type
memcpy
memset
?terminate@@YAXXZ
_fmode
_acmdln
exit
_commode
__setusermatherr
_amsg_exit
_cexit
_ismbblead
_exit
_XcptFilter
__C_specific_handler
__getmainargs
_vsnprintf
_initterm
comctl32
ord17
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12.4MB - Virtual size: 12.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 294B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ