E:\repository\REL_AV12\scheduler\BIN\avupgsvc\Release\avupgsvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
34a4e95694c3d82088d8bc4901bc6d53_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34a4e95694c3d82088d8bc4901bc6d53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34a4e95694c3d82088d8bc4901bc6d53_JaffaCakes118
-
Size
57KB
-
MD5
34a4e95694c3d82088d8bc4901bc6d53
-
SHA1
55b74ee2811496e2e15dabf9486c6f4db3faa847
-
SHA256
ae52510805c6976ab748a1bc60fb5d08156f6290fcfc22a0b9d51fd610c5e7dd
-
SHA512
d515bc819b40262e12713ed647dbc80b6c64f95ded08fb1f49e67763157b948b03106a84a9010d3c91749dc64b9652e92660483da06658fdc5c5cbb42928c2bc
-
SSDEEP
768:/kDakCeq9NKcVBb28NGYRBbmZVlaFDnkorTrnSfqmLHPGS6wudD/Mkj5aUBWLL7E:/kD3MNOMBbd7kSjTmLOthNNa6Wo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34a4e95694c3d82088d8bc4901bc6d53_JaffaCakes118
Files
-
34a4e95694c3d82088d8bc4901bc6d53_JaffaCakes118.exe windows:6 windows x86 arch:x86
7b2247344823facba87b26adebe900bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
EncodePointer
GetVersionExW
TerminateProcess
lstrcpyW
GetModuleHandleW
GetCurrentProcess
FindFirstFileW
FindClose
GetModuleFileNameW
GetExitCodeProcess
CreateProcessW
GetLastError
OpenProcess
GetCurrentProcessId
GetStartupInfoW
CloseHandle
LocalFree
LoadLibraryW
lstrcpynW
GetProcAddress
FreeLibrary
MultiByteToWideChar
CreateEventW
SetEvent
WaitForSingleObject
lstrlenW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
GetSystemTimeAsFileTime
advapi32
RegConnectRegistryW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
OpenProcessToken
DuplicateTokenEx
GetSecurityInfo
GetSecurityDescriptorDacl
GetUserNameW
BuildExplicitAccessWithNameW
SetEntriesInAclW
SetSecurityInfo
SetTokenInformation
CreateProcessAsUserW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
msvcr100
wcschr
wcsrchr
_beginthreadex
wcsstr
_wcsupr
memset
_snwprintf
free
malloc
_wcsicmp
wcsncpy_s
mbstowcs_s
_snwprintf_s
_wsplitpath_s
wcsncmp
_waccess
_errno
calloc
_filelength
_read
_close
_lseek
_wsopen
memcpy
strtoul
realloc
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_except_handler4_common
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_invoke_watson
_controlfp_s
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ