msdtcexe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
675b88d29dfda67b95fb84b777cbbee7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
675b88d29dfda67b95fb84b777cbbee7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
675b88d29dfda67b95fb84b777cbbee7_JaffaCakes118
-
Size
139KB
-
MD5
675b88d29dfda67b95fb84b777cbbee7
-
SHA1
bf8bc68c0d424c1a62dba1456c78c59b2ab4c546
-
SHA256
5ca4c15b34f07e383f5480bccc59fd0e535fadbaa72e8843c9d424876330c85d
-
SHA512
34ebafe0d3072bc5b2eb66fe743321da5054af40b129a5586c14a35d423cd7ce22e005d12a68d798f575a269968d136a28a44488db5dc4521f32aba0cbfef8d6
-
SSDEEP
1536:JXYxKTUtmPe5F3Uey7xgc9qQqsA/skHVA0a4qDLZAQcEzok3E8vroH3S7NtiXE/L:+EFxMwSsk2v7fcmEAkyXiqjsRt58
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 675b88d29dfda67b95fb84b777cbbee7_JaffaCakes118
Files
-
675b88d29dfda67b95fb84b777cbbee7_JaffaCakes118.exe windows:6 windows x86 arch:x86
891c448cce61dc42acbb35987026f0d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
UnregisterWait
TlsFree
TlsAlloc
TlsGetValue
LocalAlloc
LocalFree
IsDebuggerPresent
GetCurrentThread
GetThreadContext
DebugBreak
ExpandEnvironmentStringsW
CreateDirectoryW
CreateProcessW
GetExitCodeProcess
FindFirstFileW
FindNextFileW
SetFileAttributesW
DeleteFileW
FindClose
GetModuleHandleW
FindResourceW
LoadResource
LockResource
FormatMessageW
GetModuleFileNameW
LoadLibraryExW
DeleteCriticalSection
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
CreateEventA
CloseHandle
WaitForSingleObjectEx
SetEvent
ResetEvent
FreeLibrary
CreateFileW
GetProcAddress
LoadLibraryA
GetFullPathNameW
GetLastError
QueryFullProcessImageNameW
GetLocalTime
QueueUserWorkItem
OutputDebugStringW
GetSystemWindowsDirectoryA
InitializeCriticalSectionAndSpinCount
ole32
CoGetObjectContext
StringFromGUID2
CoInitializeEx
CoCreateInstance
CoUninitialize
msvcrt
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_CxxThrowException
_onexit
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
??0exception@@QAE@XZ
_wfopen
_purecall
__CxxFrameHandler3
_wstrdate
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
free
_callnewh
malloc
wcschr
_wstrtime
_local_unwind4
_waccess
_vsnwprintf
_wcsicmp
memset
fopen
fclose
fflush
fprintf
fwprintf
wcsrchr
memcpy
??1type_info@@UAE@XZ
msdtctm
ord4
ntdll
RtlCaptureContext
RtlReportException
version
VerQueryValueW
user32
EndDialog
SetDlgItemTextW
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationW
DialogBoxParamW
OpenDesktopW
SetThreadDesktop
GetDesktopWindow
GetWindowRect
GetClientRect
MapWindowPoints
SetWindowPos
LoadStringW
SetProcessWindowStation
advapi32
RegSetValueExW
RegQueryValueExW
OpenProcessToken
GetTokenInformation
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE