mshta.pdb
Behavioral task
behavioral1
Sample
6f9b4af9d4c707ec75accfbad5059172_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
6f9b4af9d4c707ec75accfbad5059172_JaffaCakes118
-
Size
176KB
-
MD5
6f9b4af9d4c707ec75accfbad5059172
-
SHA1
710bdd15e9d1517b4bda61d15153b70fb1980277
-
SHA256
c2ecffb8582a023eb90746b6c6b805aac0a1d4d05693d299fb452aa499965586
-
SHA512
2d2aa2664b212dc30022ae0fefd4f8688e1ef8203988fee5ada5ea24dc265d6dbb70a87b330b2b3dad2ee35f416460992d405f4df765b87182632999c1a60568
-
SSDEEP
3072:sm7lRyUzlkgqJ8CfQRSpxGhAopBYlq1g9N/R13wk2hkLwpjckYysXK94nqqf8ggu:t7Fb9CfQRSGrf0N/R1wdhkLiXYTXMOqG
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f9b4af9d4c707ec75accfbad5059172_JaffaCakes118
Files
-
6f9b4af9d4c707ec75accfbad5059172_JaffaCakes118.exe windows:5 windows x86 arch:x86
b318adeca8983660bd5e7556f344d941
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
kernel32
FreeLibrary
GetProcAddress
LoadLibraryA
ExpandEnvironmentStringsA
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
HeapAlloc
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 148KB - Virtual size: 392KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE