s:\compbld\warsaw_ff_08c4\warsaw\core\Release\GN__coms.pdb
Behavioral task
behavioral1
Sample
3efdace39ec38367a8ec741687024ffc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3efdace39ec38367a8ec741687024ffc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3efdace39ec38367a8ec741687024ffc_JaffaCakes118
-
Size
720KB
-
MD5
3efdace39ec38367a8ec741687024ffc
-
SHA1
71df1c0e4c1a09867c2fccf864f6aeace292fc0a
-
SHA256
c554dbc086636505dc959e5024369e36de19c5f521195f711935120b2632b2c7
-
SHA512
1c94012acdc3346f0dddb3226004dea73942feb56d7856ce957d4e11a008e0a582442c60134007d5082ef13eaa62951637a3c80a1eb5612c410e1152e02b67bc
-
SSDEEP
12288:kkAOohCM+5tZ3c3CMWJTI5C9b9hlGXuKIwk:klCF33c3CfTIyb9hEXuO
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3efdace39ec38367a8ec741687024ffc_JaffaCakes118
Files
-
3efdace39ec38367a8ec741687024ffc_JaffaCakes118.exe windows:5 windows x86 arch:x86
692b81c8920056dfa804bd508c47fcc0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetComputerNameA
DeleteFileA
DisconnectNamedPipe
FlushFileBuffers
SetLastError
WaitForMultipleObjects
GetOverlappedResult
ReadFile
WriteFile
ConnectNamedPipe
CreateNamedPipeA
WaitNamedPipeA
CreateFileA
ExpandEnvironmentStringsA
GetLocalTime
lstrcpynA
MultiByteToWideChar
lstrcatA
lstrcpyA
FormatMessageA
WideCharToMultiByte
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetWindowsDirectoryA
GetCurrentThreadId
SetFilePointer
GetFileSize
GetCurrentProcessId
GetCurrentProcess
GetVersionExA
GetExitCodeProcess
WaitForSingleObject
SetPriorityClass
CreateProcessA
SetThreadPriority
SetEvent
ResetEvent
CreateEventA
OpenEventA
ReleaseMutex
CreateMutexA
InterlockedIncrement
InterlockedExchange
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
ExitThread
CreateThread
LCMapStringA
LCMapStringW
GetCPInfo
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
GetACP
GetOEMCP
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetLocaleInfoW
CreateFileW
SetEndOfFile
GetCommandLineA
TerminateThread
CloseHandle
GetModuleFileNameA
GetSystemDirectoryA
GetTickCount
Sleep
GetModuleHandleA
LoadLibraryA
FreeLibrary
GetProcAddress
InterlockedDecrement
GetLastError
user32
SendMessageA
FindWindowA
winspool.drv
DeleteMonitorA
advapi32
InitializeSecurityDescriptor
RegEnumValueA
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
AllocateAndInitializeSid
FreeSid
SetKernelObjectSecurity
GetSecurityDescriptorDacl
SetSecurityInfo
InitializeAcl
AddAccessAllowedAce
CloseServiceHandle
QueryServiceStatus
ControlService
OpenServiceA
OpenSCManagerA
StartServiceA
SetSecurityDescriptorDacl
IsValidSid
GetLengthSid
GetAce
Sections
.text Size: 428KB - Virtual size: 425KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE