rasphone.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6ac6c181a3cf1e71d8043b03297f49ce_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6ac6c181a3cf1e71d8043b03297f49ce_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6ac6c181a3cf1e71d8043b03297f49ce_JaffaCakes118
-
Size
193KB
-
MD5
6ac6c181a3cf1e71d8043b03297f49ce
-
SHA1
c0533c2004fa7023c98dc956ac1eb274c602e725
-
SHA256
87e49d865c89036ae7e9246f49762124a0ace896ac65997167581d306a7d1701
-
SHA512
9f4ebeb85127065cc083c67299e3c3c4a0ca9ecb7c9574f3851677fb41534e78a5a2967c8983bb832e178e984d87859dfe2104bff16a412d0c608882185f8fc8
-
SSDEEP
3072:HR0XBN2n/hEmXNKHwEXeA44T1iQwNnXgqAfZYjZ+adnYAgcUjcLbGdA:HU2/RKHw+uXgqAarYAgcUcR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ac6c181a3cf1e71d8043b03297f49ce_JaffaCakes118
Files
-
6ac6c181a3cf1e71d8043b03297f49ce_JaffaCakes118.exe windows:6 windows x86 arch:x86
b5d03b699d548c3ead0d6d4f52b7bf83
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegDeleteValueW
RegDeleteKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
kernel32
OpenProcess
FormatMessageW
ReadFile
GlobalAddAtomW
CreateActCtxW
ReleaseActCtx
ActivateActCtx
GetFileSizeEx
GetModuleFileNameW
ReadProcessMemory
SetFilePointerEx
GetPrivateProfileStringW
HeapSetInformation
lstrlenA
GetModuleHandleW
GetProcAddress
DeactivateActCtx
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
WideCharToMultiByte
GetLastError
K32GetModuleBaseNameA
LoadLibraryW
LocalFree
GetSystemDirectoryW
FreeLibrary
GlobalFree
GlobalAlloc
CloseHandle
CreateFileW
GlobalReAlloc
MultiByteToWideChar
lstrlenW
CompareStringW
msvcrt
memset
__argv
__argc
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
rtutils
TraceDeregisterExA
TracePrintfExA
TraceRegisterExA
ntdll
ord2
_vsnwprintf
atol
RtlFreeHeap
RtlAllocateHeap
NtQueryInformationProcess
memcpy
ord1
user32
GetSystemMetrics
GetPropW
ShowWindow
IsWindowVisible
SetPropW
RemovePropW
LoadStringW
CharNextW
CharPrevW
GetParent
UnhookWindowsHookEx
MessageBoxW
SetWindowsHookExW
SetWindowPos
GetWindowRect
rpcrt4
I_RpcExceptionFilter
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE