sspipes.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3eda3caec3578c472c4e361f00415b8b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3eda3caec3578c472c4e361f00415b8b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3eda3caec3578c472c4e361f00415b8b_JaffaCakes118
-
Size
624KB
-
MD5
3eda3caec3578c472c4e361f00415b8b
-
SHA1
27da13f16a05c61ebbedf89c0f71ed50a45beaef
-
SHA256
7d8ddcdd711d6a0d85d6814c60c43791cc0ae0221597e17a5982c6a5c579b3e6
-
SHA512
7c0e5de983c0fb96dda5ce6a4939093cf91d48517b5df5993bb4822a10c92703ca96cc5b93a54b92f7e1ed37e1c23c56fd6495b96ff21089b6104202ecc38200
-
SSDEEP
12288:Nl4NXaEeTdbbTxKAWFhBJ8Q0oZyltDqlFGhoZ0joAFddFwq:T2aEeTd9KAWFhBJ8Q0aSqlFl00Anw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3eda3caec3578c472c4e361f00415b8b_JaffaCakes118
Files
-
3eda3caec3578c472c4e361f00415b8b_JaffaCakes118.exe windows:5 windows x86 arch:x86
be549f1f092af1ba66eb04e8a18b62f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyA
RegQueryValueExA
kernel32
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
GetTimeZoneInformation
HeapFree
ExitProcess
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetCurrentProcessId
HeapCreate
GetPrivateProfileIntW
HeapAlloc
VirtualAlloc
HeapReAlloc
IsBadWritePtr
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
InterlockedExchange
VirtualQuery
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FindFirstFileW
HeapDestroy
GetPrivateProfileStringW
FlushFileBuffers
SetStdHandle
SetFilePointer
VirtualFree
GetPrivateProfileSectionW
IsBadCodePtr
IsBadReadPtr
GetWindowsDirectoryW
lstrlenW
lstrcpyW
Sleep
LocalAlloc
LocalFree
DebugBreak
IsProcessorFeaturePresent
GetFileSize
MapViewOfFile
CreateFileMappingA
CreateFileA
CreateFileW
CloseHandle
UnmapViewOfFile
LockResource
LoadResource
SizeofResource
FindResourceA
FindResourceW
GetModuleHandleW
lstrcatW
FreeLibrary
LoadLibraryW
GetCommandLineW
SetThreadPriority
GetCurrentThread
GetVersionExW
QueryPerformanceFrequency
RaiseException
HeapSize
user32
wsprintfW
PeekMessageW
DialogBoxParamW
CheckRadioButton
GetDlgItem
EnableWindow
IsDlgButtonChecked
SendMessageW
SendDlgItemMessageW
EndDialog
LoadStringW
GetSystemMetrics
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetRectEmpty
EnumDisplaySettingsW
UpdateWindow
SetRect
InvalidateRect
ScreenToClient
DrawTextW
FrameRect
FillRect
MessageBoxW
SetWindowPos
GetWindowTextW
CheckDlgButton
SetWindowTextW
GetClientRect
CreateWindowExW
AdjustWindowRect
RegisterClassW
LoadIconW
LoadCursorW
PostQuitMessage
SystemParametersInfoW
SetCursor
ShowWindow
DispatchMessageW
TranslateMessage
GetMessageW
PostMessageW
DefWindowProcW
SetTimer
KillTimer
EndPaint
BeginPaint
UnionRect
comctl32
ord17
comdlg32
GetOpenFileNameW
gdi32
DeleteObject
ExcludeClipRect
GetStockObject
winmm
timeGetTime
d3d8
Direct3DCreate8
Exports
Exports
??0PrimProcessor@@QAE@XZ
??1PrimProcessor@@QAE@XZ
??4PrimProcessor@@QAEAAV0@ABV0@@Z
?AllocSpans@PrimProcessor@@QAEJPAIPAPAUtagD3DI_RASTSPAN@@@Z
?AppendPrim@PrimProcessor@@AAEJXZ
?Begin@PrimProcessor@@QAEXXZ
?BeginPrimSet@PrimProcessor@@QAEXW4_D3DPRIMITIVETYPE@@W4_RAST_VERTEX_TYPE@@@Z
?ClrFlags@PrimProcessor@@QAEXI@Z
?End@PrimProcessor@@QAEJXZ
?FillPointSpan@PrimProcessor@@AAEXPAU_D3DTLVERTEX@@PAUtagD3DI_RASTSPAN@@@Z
?Flush@PrimProcessor@@AAEJXZ
?FlushPartial@PrimProcessor@@AAEJXZ
?FreeSpans@PrimProcessor@@QAEXI@Z
?GetFlags@PrimProcessor@@QAEIXZ
?Initialize@PrimProcessor@@QAEJXZ
?Line@PrimProcessor@@QAEJPAU_D3DTLVERTEX@@00@Z
?LineSetup@PrimProcessor@@AAEHPAU_D3DTLVERTEX@@0@Z
?NormalizeLineRHW@PrimProcessor@@AAEXPAU_D3DTLVERTEX@@0@Z
?NormalizePointRHW@PrimProcessor@@AAEXPAU_D3DTLVERTEX@@@Z
?NormalizeTriRHW@PrimProcessor@@AAEXPAU_D3DTLVERTEX@@00@Z
?Point@PrimProcessor@@QAEJPAU_D3DTLVERTEX@@0@Z
?PointDiamondCheck@PrimProcessor@@AAEHHHHH@Z
?ResetBuffer@PrimProcessor@@AAEXXZ
?SetCtx@PrimProcessor@@QAEXPAUtagD3DI_RASTCTX@@@Z
?SetFlags@PrimProcessor@@QAEXI@Z
?SetTriFunctions@PrimProcessor@@AAEXXZ
?StateChanged@PrimProcessor@@QAEXXZ
?Tri@PrimProcessor@@QAEJPAU_D3DTLVERTEX@@00@Z
?TriSetup@PrimProcessor@@AAEHPAU_D3DTLVERTEX@@00@Z
Sections
.text Size: 520KB - Virtual size: 516KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hjbsaff Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE