D:\ccViews\autobuild1_BR-0705-1458_3.0_Snapshot\AMT_Development\SW\Src\Services\LMS\Release\LMS.pdb
Static task
static1
Behavioral task
behavioral1
Sample
64865b1536ea0f19b6ec80cfd3598fab_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
64865b1536ea0f19b6ec80cfd3598fab_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
64865b1536ea0f19b6ec80cfd3598fab_JaffaCakes118
-
Size
106KB
-
MD5
64865b1536ea0f19b6ec80cfd3598fab
-
SHA1
cd12232c927b824f8ccbdda18eddbcf47b466511
-
SHA256
48f7df638123278be24dd8c149c52bd3d4d91b6bea66ed17d5852909c7fbd0e9
-
SHA512
66f781eec61f27af78933715161d39fc5e9f62d91cc5996ebee9fd7783738b183269f3c7fda8683446b3ddc15848521ca76850a31db6bf83ceae3c9b78634ffc
-
SSDEEP
1536:xzGji04hm5tO+is+y+Ovw7FoOB7mQxOETdvEqYrGg31Hw/EclQUMv0ciQ:c204hm5tg2w7FoO5L6a/EclxMv04
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 64865b1536ea0f19b6ec80cfd3598fab_JaffaCakes118
Files
-
64865b1536ea0f19b6ec80cfd3598fab_JaffaCakes118.exe windows:4 windows x86 arch:x86
faed91a0f8b43e16393ff795cecb9fe5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
ws2_32
__WSAFDIsSet
accept
recv
connect
ioctlsocket
listen
socket
select
bind
closesocket
ntohs
getservbyport
gethostbyaddr
getservbyname
htonl
gethostbyname
WSAGetLastError
inet_addr
WSAStartup
inet_ntoa
htons
send
setsockopt
iphlpapi
GetIpAddrTable
kernel32
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
WideCharToMultiByte
CreateEventA
GetCurrentProcess
CloseHandle
WaitForSingleObject
SetEvent
FormatMessageA
GetOverlappedResult
GetLastError
ReadFile
WriteFile
DeviceIoControl
CreateFileA
Sleep
GetModuleFileNameA
GetVersionExA
GetEnvironmentStringsW
GetStdHandle
AllocConsole
GetProcAddress
GetModuleHandleA
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryA
GetSystemDirectoryA
CreateSemaphoreA
ReleaseSemaphore
GetCurrentThreadId
ResumeThread
GetTickCount
SetFilePointer
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
FlushFileBuffers
SetUnhandledExceptionFilter
InterlockedExchange
VirtualQuery
IsBadReadPtr
IsBadCodePtr
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapSize
SetEndOfFile
LocalFree
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
ExitProcess
RtlUnwind
RaiseException
SetStdHandle
GetFileType
ExitThread
CreateThread
GetCommandLineA
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TerminateProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
user32
RegisterDeviceNotificationA
DefWindowProcA
CreateWindowExA
RegisterClassA
UnregisterDeviceNotification
DestroyWindow
advapi32
ChangeServiceConfig2A
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerExA
StartServiceA
RegDeleteValueA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegDeleteKeyA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegisterEventSourceA
ReportEventA
DeregisterEventSource
SetServiceStatus
GetUserNameA
LookupAccountNameA
IsValidSid
GetLengthSid
CopySid
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ