OpnFiles.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3e9444adc59edaa1b74495d9bf5550f8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3e9444adc59edaa1b74495d9bf5550f8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3e9444adc59edaa1b74495d9bf5550f8_JaffaCakes118
-
Size
71KB
-
MD5
3e9444adc59edaa1b74495d9bf5550f8
-
SHA1
3d531a99088373deb4ad866d9630e7102bf9651e
-
SHA256
3fd6a6c47d3f7e867b1c47983effacaae54c50cf12830d85833ff886dc46677d
-
SHA512
3205c7fea7d908e2150094f247ca70af512f4553c2e447ebc4cbaa1c1640743e693c08ea1868486a751cdc6d2ebaf200c71a851e40c548e1daee503633a068cf
-
SSDEEP
1536:sPrAPWdkfpBm0rJvWyH9O5Ts5MlNnCc7Ab4NqivtsxkUdQ:sPruIkfJrJO+9O95lNnCrbyqivtsxkc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e9444adc59edaa1b74495d9bf5550f8_JaffaCakes118
Files
-
3e9444adc59edaa1b74495d9bf5550f8_JaffaCakes118.exe windows:5 windows x86 arch:x86
f2177ecc673dae04436ff4acbdd10c15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
__set_app_type
_except_handler3
??1type_info@@UAE@XZ
__p__fmode
?terminate@@YAXXZ
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__winitenv
_wtol
malloc
realloc
wcsstr
free
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_wcsicmp
wcsncpy
_wgetcwd
_c_exit
_exit
_XcptFilter
_cexit
_controlfp
exit
calloc
wcstod
wcstol
wcsncmp
fflush
fprintf
wcschr
strtok
wcslen
_wcsnicmp
sprintf
wcstok
_iob
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
LookupAccountSidW
RegSetValueExW
RegConnectRegistryW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
kernel32
VerSetConditionMask
VerifyVersionInfoW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetTimeFormatW
WideCharToMultiByte
OpenProcess
GetStdHandle
GetConsoleScreenBufferInfo
CloseHandle
GetLogicalDrives
GetDriveTypeW
GetVolumeInformationW
lstrcpynW
FindFirstFileW
FindClose
SetConsoleCursorPosition
WriteConsoleW
LocalFree
FormatMessageW
ReadConsoleW
ReadFile
SetConsoleMode
GetConsoleMode
FileTimeToSystemTime
GetComputerNameExW
GetCurrentProcess
QueryPerformanceCounter
lstrlenW
lstrcpyW
SetLastError
lstrcmpW
lstrcatW
lstrcmpiW
GetLastError
CompareStringW
FreeLibrary
LoadLibraryW
GetSystemDirectoryW
GetProcAddress
GetComputerNameW
MultiByteToWideChar
VirtualQuery
VirtualAlloc
VirtualFree
ntdll
RtlDestroyQueryDebugBuffer
RtlFreeHeap
RtlInitAnsiString
RtlAnsiStringToUnicodeString
RtlAllocateHeap
NtQuerySystemInformation
RtlInitUnicodeString
user32
LoadStringW
CharUpperW
wsprintfW
mpr
WNetGetLastErrorW
WNetCancelConnection2W
WNetAddConnection2W
netapi32
NetFileClose
NetApiBufferFree
NetFileEnum
NetServerGetInfo
secur32
GetUserNameExW
ws2_32
WSACleanup
gethostbyaddr
inet_addr
WSAGetLastError
WSAStartup
gethostbyname
framedyn
?Left@CHString@@QBE?AV1@H@Z
?Mid@CHString@@QBE?AV1@HH@Z
??4CHString@@QAEABV0@ABV0@@Z
?Format@CHString@@QAAXPBGZZ
??0CHString@@QAE@XZ
??4CHString@@QAEABV0@PBG@Z
??1CHString@@QAE@XZ
?GetData@CHString@@IBEPAUCHStringData@@XZ
?MakeUpper@CHString@@QAEXXZ
?Find@CHString@@QBEHPBG@Z
?Right@CHString@@QBE?AV1@H@Z
??YCHString@@QAEABV0@PBG@Z
?Mid@CHString@@QBE?AV1@H@Z
?TrimRight@CHString@@QAEXXZ
??0CHString@@QAE@PBG@Z
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 21B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ