C:\BUILD_AREA\jdk6\control\build\windows-i586\tmp\deploy\javaws\bin\javaws.pdb
Static task
static1
Behavioral task
behavioral1
Sample
678c9cb79671f5879c8f09db04d20990_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
678c9cb79671f5879c8f09db04d20990_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
678c9cb79671f5879c8f09db04d20990_JaffaCakes118
-
Size
136KB
-
MD5
678c9cb79671f5879c8f09db04d20990
-
SHA1
d7a996cb9b036f54deccdb8de9fc2924ed8912e3
-
SHA256
44e74f2d390d62cea3e38dc3e7c4149fad0c0a0e0a4f965f56cb23a5c51335e5
-
SHA512
c284c6f76e9434a9fdc11253ca327ca3f4b8b7262df0c34170232077edf4fba62968157bc52048f454765d924ca1029691f6f2c9d8b13749b9eccff21dd2dafd
-
SSDEEP
3072:T4elsUeaEXW6BQZv6NSgapKbDsnplerDRBjZqMN:TpyrZdBQZvGakbHxv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 678c9cb79671f5879c8f09db04d20990_JaffaCakes118
Files
-
678c9cb79671f5879c8f09db04d20990_JaffaCakes118.exe windows:4 windows x86 arch:x86
3bd3c8ab805e675e9ee8d991d6c37b33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetThreadLocale
WideCharToMultiByte
GlobalAlloc
MultiByteToWideChar
ReadFile
CloseHandle
WaitForSingleObject
CreateProcessA
SetHandleInformation
CreatePipe
CreateDirectoryA
GetWindowsDirectoryA
FindClose
GetModuleFileNameA
GetModuleHandleA
GetVersionExA
SetEnvironmentVariableW
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetTickCount
LoadLibraryA
GetProcAddress
FindFirstFileA
FreeLibrary
GetCurrentProcessId
QueryPerformanceCounter
GetTimeZoneInformation
FlushFileBuffers
HeapSize
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemInfo
VirtualProtect
InitializeCriticalSection
GetOEMCP
GetACP
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetLastError
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
GetFileType
CreateFileA
GetStartupInfoA
GetCommandLineA
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetStringTypeA
GetStringTypeW
WriteFile
SetStdHandle
SetHandleCount
GetStdHandle
GetFileAttributesA
SetEndOfFile
SetFilePointer
RtlUnwind
InterlockedExchange
VirtualQuery
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetLocaleInfoA
GetExitCodeProcess
user32
wsprintfA
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
CreateWindowExA
RegisterClassA
LoadCursorA
MessageBoxA
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
wsock32
listen
getsockname
accept
recv
bind
socket
ioctlsocket
htons
connect
send
WSAGetLastError
WSAStartup
closesocket
WSAAsyncSelect
ntohs
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE