c:\prog\HPCASL\HPDrvMnt\HPDrvMntSvc\Release\HPDrvMntSvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4180182625c225980b44edf33376014f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4180182625c225980b44edf33376014f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4180182625c225980b44edf33376014f_JaffaCakes118
-
Size
90KB
-
MD5
4180182625c225980b44edf33376014f
-
SHA1
ad553eb6d3dc4b6b1dce14dc90392296fea45f84
-
SHA256
2f3c3584dd1ea09d32fcda7877fe457a1173c4c1c7a70407213a18c3edfa12a1
-
SHA512
a686ec974708fb2978450cf61632cf4b2b42a0c1ca6f9b44be8926190b3328600477c11f3e56c42ef928d089de86d38924f93e3090361aac2439d27292bf874f
-
SSDEEP
1536:ukU4TUlQWCJsjpRvvi2bX3Ao/F1TMzmkLbh8FZbt+dn5O+:S4TUOQ/vZ73AU7nL+dn5F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4180182625c225980b44edf33376014f_JaffaCakes118
Files
-
4180182625c225980b44edf33376014f_JaffaCakes118.exe windows:6 windows x86 arch:x86
38add70f0e885d5d4020fcc1a3f0f11a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
DeleteCriticalSection
GetLocalTime
GlobalFree
EnterCriticalSection
CreateFileW
LeaveCriticalSection
GlobalAlloc
InitializeCriticalSection
CreateDirectoryW
GetLastError
CreateFileA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
FlushFileBuffers
LoadLibraryA
SetEndOfFile
ReadFile
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
TranslateMessage
DispatchMessageW
GetMessageW
advapi32
CloseServiceHandle
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
ControlService
SetServiceStatus
RegisterServiceCtrlHandlerExW
OpenServiceW
GetServiceKeyNameW
StartServiceCtrlDispatcherW
OpenSCManagerW
shell32
SHGetFolderPathW
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ