spiisupd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
36f9fb284a02702b6f78008e06bebc46_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
36f9fb284a02702b6f78008e06bebc46_JaffaCakes118
-
Size
198KB
-
MD5
36f9fb284a02702b6f78008e06bebc46
-
SHA1
8af5b9dfbe7dd923abac6c8675c59e8e6b822b58
-
SHA256
92a9c8cbf13129a51e04a59cfcbe728ecddbf655f623b5f79a0f0361903fce09
-
SHA512
4c3aa762354fa7e1e3df4ceacce780fe4db7105763806482e49af316dbeb8e17e845f125997c4893a920dfad2788adc4d6f0b214d8f4a6622bb29fa26480ea89
-
SSDEEP
3072:Yutjz/X6Sx2Pr/UaEDUJI/gWg8MP9CijDBq+bA:Hnx2PYUe/gWg8GIgDm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36f9fb284a02702b6f78008e06bebc46_JaffaCakes118
Files
-
36f9fb284a02702b6f78008e06bebc46_JaffaCakes118.exe .js windows:5 windows x86 arch:x86 polyglot
0fdbe8bbe52056b36c6756f93480111f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_except_handler3
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_strdup
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_strlwr
strstr
strchr
strncmp
memmove
fwrite
_filelength
fread
fopen
fgetc
fseek
fclose
_initterm
vsprintf
kernel32
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetEnvironmentVariableA
OutputDebugStringA
GetStartupInfoA
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 185KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE