rtcshare.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6759c8c4f7826e40d78754381427aa38_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6759c8c4f7826e40d78754381427aa38_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6759c8c4f7826e40d78754381427aa38_JaffaCakes118
-
Size
93KB
-
MD5
6759c8c4f7826e40d78754381427aa38
-
SHA1
1e4991c42b0e4a9be656336e38419835c2704478
-
SHA256
4faa48fd2ffddc2a3b6c59595001656f8df530c833920563e9c335e12faa9b44
-
SHA512
78f03bc106e8f82e1d9d28210701b02a3887864371a2fd927c054bf0ab0ea37d7183a45337877c5cce3d324fe18079370729ac52effc446acad2ad633238fd7b
-
SSDEEP
1536:Ht1EC3XEdTxBe97V92WybMZLRAQ7EasdkqV7ERS8T4lKE8cf1+IfCbEsl:wdLspXBRAQ7WeqRExuKE8ZIKwsl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6759c8c4f7826e40d78754381427aa38_JaffaCakes118
Files
-
6759c8c4f7826e40d78754381427aa38_JaffaCakes118.exe windows:5 windows x86 arch:x86
55d107cfc57c47a220ce37f2edc4aedd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_cexit
exit
_wcmdln
__wgetmainargs
_initterm
_XcptFilter
_exit
_c_exit
wcscmp
_wcsicmp
wcslen
_wcsnicmp
_snwprintf
??2@YAPAXI@Z
_purecall
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
wcscpy
wcscat
??3@YAXPAX@Z
atl
ord35
ord31
ord44
ord11
ord10
ord30
ord58
ord32
ord45
ord20
ord17
ord23
ord57
ord18
ord43
ord16
ord21
advapi32
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
kernel32
HeapAlloc
LoadLibraryA
GetProcessHeap
VirtualAlloc
GetSystemTimeAsFileTime
HeapFree
GetStartupInfoW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
VirtualFree
lstrcpyW
HeapDestroy
FreeLibrary
GetLastError
lstrlenW
FlushInstructionCache
GetCurrentProcess
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
SetLastError
GetModuleFileNameW
GetCurrentProcessId
CloseHandle
CreateMutexW
lstrcmpiW
GetCommandLineW
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
IsBadWritePtr
IsBadStringPtrW
lstrlenA
IsBadStringPtrA
LocalFree
GetModuleHandleW
FormatMessageW
GetCurrentThreadId
GetProcAddress
LoadLibraryW
QueryPerformanceCounter
GetTickCount
HeapCreate
gdi32
DeleteObject
user32
SetDlgItemTextW
SendDlgItemMessageW
EndDialog
CallWindowProcW
SetForegroundWindow
FindWindowW
SystemParametersInfoW
GetMonitorInfoW
MonitorFromRect
LoadStringW
CreateWindowExW
DispatchMessageW
TranslateMessage
GetMessageW
PostMessageW
CharNextW
SendMessageW
ShowWindow
LoadBitmapW
LoadImageW
SetWindowTextW
SetWindowPos
GetClientRect
SetTimer
KillTimer
MessageBoxW
DestroyWindow
SetWindowLongW
GetSysColorBrush
GetSystemMetrics
PostQuitMessage
DefWindowProcW
GetWindowLongW
comctl32
CreateStatusWindowW
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
ord17
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysAllocString
LoadRegTypeLi
SafeArrayGetElement
VariantClear
SysAllocStringLen
SysStringLen
SysFreeString
shell32
CommandLineToArgvW
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 772B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE