expand.pdb
Behavioral task
behavioral1
Sample
5bbe8fe752ec49746c7d77c72a337546_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5bbe8fe752ec49746c7d77c72a337546_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5bbe8fe752ec49746c7d77c72a337546_JaffaCakes118
-
Size
196KB
-
MD5
5bbe8fe752ec49746c7d77c72a337546
-
SHA1
b7afd3f6d5971a657e4fc8c0bf194846a2d93a1a
-
SHA256
cc7801397df339402e77d1d6dc302eda110e124fc87ed450efbb1ef617f815f1
-
SHA512
5515d9c57dea301f51c7a271931ef28f24f03cd1a39982df1c9b1172a56d36f644503ca3603d1ef088947cec67e5a280b41423ce5ef0ec8f1fbc5c72f512e414
-
SSDEEP
6144:nkHCb1kroNE56X2XSeJIu/oh6NXKJqH2Lh7:nk81kcNEYX2XTT/o4WLh7
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bbe8fe752ec49746c7d77c72a337546_JaffaCakes118
Files
-
5bbe8fe752ec49746c7d77c72a337546_JaffaCakes118.exe windows:6 windows x86 arch:x86
074383fc16620ae124bd41a6116d67b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
SetFileTime
_lclose
LocalAlloc
LocalFree
_lopen
_lread
GetLastError
_lwrite
_llseek
GetFileAttributesA
GetFileAttributesW
GetCurrentDirectoryW
GetTempPathW
WideCharToMultiByte
MultiByteToWideChar
FormatMessageW
WaitForSingleObject
CreateThread
GetACP
LoadLibraryA
GetProcAddress
SearchPathW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
_lcreat
GetLocaleInfoW
GetVersionExW
CreateFileW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
SetLastError
LoadResource
FindResourceExW
lstrcmpA
GetStringTypeW
GetFileTime
lstrlenA
GlobalAlloc
GlobalFree
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
Sleep
InterlockedExchange
HeapSetInformation
SetThreadUILanguage
GetConsoleOutputCP
lstrcmpiW
lstrcmpiA
GetFullPathNameW
RaiseException
GetFullPathNameA
FreeLibrary
IsDBCSLeadByte
msvcrt
_snprintf
_itoa
ferror
__badioinfo
_fileno
_lseeki64
_write
_isatty
bsearch
_wcsicmp
isleadbyte
__mb_cur_max
__pioinfo
mbtowc
_controlfp
?terminate@@YAXXZ
memset
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__getmainargs
_errno
??3@YAXPAX@Z
memcpy
malloc
free
_vsnprintf
_wsetlocale
fflush
_iob
fputs
toupper
printf
_vsnwprintf
wcsncmp
_wcsnicmp
ntdll
RtlUnwind
RtlMultiByteToUnicodeN
NlsMbCodePageTag
user32
CharLowerA
LoadStringA
CharToOemA
LoadStringW
cabinet
ord23
ord20
ord21
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE