d:\USR\P4\Shared\Components\bin\release\DevSvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
615f20fa4ccc1f5c109466d3c9b35eb0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
615f20fa4ccc1f5c109466d3c9b35eb0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
615f20fa4ccc1f5c109466d3c9b35eb0_JaffaCakes118
-
Size
224KB
-
MD5
615f20fa4ccc1f5c109466d3c9b35eb0
-
SHA1
e8f9bf29f2c31320dead80a708d3661b2a3e8780
-
SHA256
488253025e26fcd7e70a2ba74ef2357b4436dd0a4ab561e95c51f7f14c5a405f
-
SHA512
342bc187fb3c48e458b969e8b4108e7901036a52de1df8f0b12d796ee2399d8752aa984b0215f27d19d30f886c5fbf545a4909c2a7ef8c5b6710b121425603ec
-
SSDEEP
6144:+n8gS4cwQZlShYQucq3XxBgGquOTfW2T8:+8gSwXhYNcqb6T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 615f20fa4ccc1f5c109466d3c9b35eb0_JaffaCakes118
Files
-
615f20fa4ccc1f5c109466d3c9b35eb0_JaffaCakes118.exe windows:4 windows x86 arch:x86
27d4e188cf431021548236010a0c94a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
GetCommandLineA
GetCurrentThreadId
GetModuleHandleA
CreateWaitableTimerA
SetWaitableTimer
GetCurrentThread
GetCurrentProcess
Sleep
GetModuleFileNameA
lstrlenA
lstrlenW
ResetEvent
CreateEventA
WideCharToMultiByte
MultiByteToWideChar
WaitForMultipleObjects
CreateThread
SetEvent
WaitForSingleObject
RaiseException
CloseHandle
GetLastError
OutputDebugStringA
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
InterlockedExchange
GetSystemTimeAsFileTime
user32
CharLowerBuffA
LoadStringA
MessageBoxA
TranslateMessage
DispatchMessageA
GetMessageA
CharNextA
CharUpperA
PostThreadMessageA
RegisterDeviceNotificationA
UnregisterDeviceNotification
wsprintfA
UnregisterClassA
advapi32
GetLengthSid
ReportEventA
RegisterEventSourceA
CloseServiceHandle
OpenServiceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerExA
OpenThreadToken
OpenProcessToken
CreateServiceA
ChangeServiceConfig2A
GetTokenInformation
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
IsValidSid
DeregisterEventSource
CopySid
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
SetServiceStatus
ControlService
DeleteService
OpenSCManagerA
ole32
CoUninitialize
CoInitializeEx
CoInitializeSecurity
CoResumeClassObjects
CoCreateGuid
MkParseDisplayName
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
CLSIDFromString
StringFromGUID2
CoCreateInstance
CoSuspendClassObjects
CreateBindCtx
oleaut32
SysAllocStringLen
VariantCopy
VarBstrCat
VariantInit
VarBstrCmp
SysStringLen
VariantCopyInd
SafeArrayCreate
SafeArrayRedim
SafeArrayDestroy
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SafeArrayLock
SafeArrayCopy
SysFreeString
SafeArrayUnlock
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetVartype
VariantClear
atl80
ord20
ord61
ord23
ord32
ord18
ord22
ord64
ord17
ord30
msvcp80
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
msvcr80
_crt_debugger_hook
__set_app_type
__p__fmode
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__p__commode
__dllonexit
_encode_pointer
_unlock
?_name_internal_method@type_info@@QBEPBDPAU__type_info_node@@@Z
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
strtok
_stricmp
_strlwr
strtoul
strstr
strcpy_s
_wcsupr
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_invoke_watson
_controlfp_s
memcpy
__RTtypeid
??3@YAXPAX@Z
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
__CxxFrameHandler3
_CxxThrowException
memcpy_s
??0exception@std@@QAE@ABV01@@Z
free
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??2@YAPAXI@Z
_purecall
_recalloc
calloc
memset
??_V@YAXPAX@Z
_vsnprintf_s
malloc
_resetstkoflw
memmove_s
wcsstr
puts
_cexit
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lodfrhw Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE