g:\projects\osrloa~1\objfre_wxp_x86\i386\OSRLOADER.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3df54329a2e09ccca9be616891bc09ce_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3df54329a2e09ccca9be616891bc09ce_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3df54329a2e09ccca9be616891bc09ce_JaffaCakes118
-
Size
51KB
-
MD5
3df54329a2e09ccca9be616891bc09ce
-
SHA1
719792e6b41d19f94727547e8ae50a5c9e3b8055
-
SHA256
0a593fa06c91299bc7834b288dae12b8887b41110b2ec66e9d62effebf1e399e
-
SHA512
bef1e382bf4b21339529570fdcff1811aaa6b819e11a85fafda9ef48fc5afdcbb6310b82cdb8812617fc64b99aeee4c2144642f1dde6c183557aa64e17872d95
-
SSDEEP
1536:7UdEuCi77psOzJqvNFVj5zmEm/eQ6XrJhZ34u0s89:YjhJqvNFVj5zmEqeQ6XrJhZ3pw9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3df54329a2e09ccca9be616891bc09ce_JaffaCakes118
Files
-
3df54329a2e09ccca9be616891bc09ce_JaffaCakes118.exe windows:6 windows x86 arch:x86
5d35423e920a8f4214c5f25a16efc888
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
OpenSCManagerA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
CloseServiceHandle
StartServiceA
OpenServiceA
ControlService
DeleteService
QueryServiceConfigA
RegEnumKeyExA
CreateServiceA
EnumServicesStatusA
kernel32
GetFileTime
GetDriveTypeA
GetLastError
FormatMessageA
LocalFree
GetWindowsDirectoryA
Sleep
LoadLibraryA
GetProcAddress
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
InterlockedExchange
gdi32
GetTextMetricsA
user32
DrawIcon
GetSystemMenu
IsIconic
GetClientRect
LoadIconA
GetSystemMetrics
GetDC
ReleaseDC
SendMessageA
EnableWindow
AppendMenuA
mfc42
ord4080
ord3079
ord3825
ord3831
ord3830
ord3402
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4396
ord1776
ord4078
ord6055
ord2575
ord825
ord609
ord3639
ord4401
ord2581
ord4219
ord2024
ord2413
ord6366
ord1771
ord692
ord3610
ord4407
ord656
ord800
ord641
ord860
ord540
ord324
ord3597
ord4425
ord5280
ord1775
ord6052
ord2514
ord4627
ord4376
ord5265
ord2370
ord2302
ord4234
ord4710
ord2642
ord6334
ord4853
ord5609
ord2777
ord1200
ord6283
ord6282
ord6782
ord6569
ord3803
ord3640
ord3370
ord4402
ord2582
ord693
ord2614
ord4160
ord6907
ord2818
ord3996
ord4673
ord4274
ord561
ord3738
ord4622
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord815
ord802
ord616
ord2621
ord6141
ord5859
ord823
ord1168
ord2863
ord2379
ord3582
ord4398
ord2578
ord4218
ord2023
ord2411
ord1146
ord537
ord542
ord2365
ord2295
ord2364
ord2299
ord1085
ord858
ord941
ord5572
ord2915
ord6453
ord755
ord470
ord2393
ord939
ord3984
ord713
ord3983
ord5604
ord414
ord665
ord3318
ord2820
ord547
ord353
ord940
ord3499
ord2515
ord355
ord3663
ord2859
ord3998
ord4424
ord3574
ord567
ord1187
ord6937
ord1576
ord4998
msvcrt
_ismbblead
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_controlfp
_XcptFilter
_exit
_cexit
__getmainargs
_chdir
time
??_V@YAXPAX@Z
memset
??_U@YAPAXI@Z
_splitpath
_stricmp
__CxxFrameHandler
_setmbcp
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ntdll
RtlUnwind
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hba Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE