P:\PEnMM\bin\util\SetReadD500.pdb
Static task
static1
Behavioral task
behavioral1
Sample
687af10b7a46a5781bfa73199a37f1d2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
687af10b7a46a5781bfa73199a37f1d2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
687af10b7a46a5781bfa73199a37f1d2_JaffaCakes118
-
Size
83KB
-
MD5
687af10b7a46a5781bfa73199a37f1d2
-
SHA1
9340b30759671ddada944576857756d8e38ef870
-
SHA256
ae140e74d3243129b1853f8a6d986c651c6f90a79c4fb9d71e143573d0e08b18
-
SHA512
4e4ca4c242c1215c2b45afd63590c64fa6e01ae40b692009a7ae071b8c6300ca46b76bdbdfe6074621156fbebe137075d23112ef2d207a24321e6b29e900adfd
-
SSDEEP
1536:1RYdf3SXKrIVZ9j2DSQfp2If4+mRKLX/cdIMO6jcxINi0aAxrOSxoyku2:1RYdfIVZYOUpcUEONrqtxoRL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 687af10b7a46a5781bfa73199a37f1d2_JaffaCakes118
Files
-
687af10b7a46a5781bfa73199a37f1d2_JaffaCakes118.exe windows:4 windows x86 arch:x86
9bcda92d35f1f4a9b8ec3a58ab3d5f49
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleA
GetModuleFileNameA
GetWindowsDirectoryA
CompareStringA
LoadLibraryA
GetLastError
SetLastError
FreeLibrary
DeleteCriticalSection
InitializeCriticalSection
GetSystemDirectoryA
InterlockedExchange
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetVersionExA
ExitProcess
funcbased500
?InitInstance@CBaseApp@@UAEHXZ
?ReadSmsInfo@CBaseApp@@QAE_NW4MobileStorage@@AAUSSmsInfo@@@Z
?GetCount@CMessages@@QBEHXZ
?ReadSmsFromDB@CBaseApp@@QAEXPAVCMessage@@AAVCSmsItem@@@Z
?SetRead@CBaseApp@@QAEXAAVCSmsItem@@@Z
??0CBaseApp@@QAE@XZ
??1CBaseApp@@UAE@XZ
?ExitInstance@CBaseApp@@UAEHXZ
phonedatatyped500
??1CSmsItem@@QAE@XZ
??0CSmsItem@@QAE@XZ
mfc71lu
ord2054
ord2009
ord5579
ord3800
ord1007
ord4320
ord6215
ord5378
ord3826
ord1911
ord2925
ord5220
ord5222
ord3942
ord4562
ord5226
ord5209
ord5562
ord2531
ord2725
ord2829
ord4301
ord2708
ord2832
ord2534
ord2640
ord2527
ord2984
ord3712
ord3713
ord3703
ord2638
ord3943
ord4475
ord4255
ord3327
ord764
ord6274
ord3795
ord6272
ord4008
ord4032
ord1198
ord5096
ord1079
mslur71
exit
_wcmdln
_amsg_exit
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
__dllonexit
_onexit
__security_error_handler
?terminate@@YAXXZ
_controlfp
_cexit
__CxxFrameHandler
_XcptFilter
_exit
_c_exit
memset
free
_except_handler3
type
?GetAt@CMessages@@QAEPAVCMessage@@H@Z
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0rdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE