exe\distrib.pdb
Static task
static1
Behavioral task
behavioral1
Sample
76440ef8ae0de6ca142ea5cf2457cbce_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
76440ef8ae0de6ca142ea5cf2457cbce_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
76440ef8ae0de6ca142ea5cf2457cbce_JaffaCakes118
-
Size
132KB
-
MD5
76440ef8ae0de6ca142ea5cf2457cbce
-
SHA1
64302176ad709f700285e25998b590aba61d369d
-
SHA256
cf67b1ba66d05d82ec66736921ac7e4d51942394bcef29a490924fa573a73902
-
SHA512
23d8a931d46540890bbc09d29b7df6b7dacffe3d0aadc9df4b2559c37c13ebfefc163ddeede4e3bc82f63904f7227d752b7a578da245b9da010978bf9c14c69c
-
SSDEEP
3072:CKBD9PdHUkDqkgkgYAq3EWP4IbASZUkZEe:CcUkBgH7WJbBZEe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76440ef8ae0de6ca142ea5cf2457cbce_JaffaCakes118
Files
-
76440ef8ae0de6ca142ea5cf2457cbce_JaffaCakes118.exe windows:4 windows x86 arch:x86
34993ee53fbcacaaa8b37eb18ee07841
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
atl71
ord30
ord31
ord58
ord61
ord23
ord32
ord49
ord20
ord17
ord64
ord22
ord18
imagehlp
SymCleanup
SymSetOptions
SymInitialize
SymGetModuleBase
SymFunctionTableAccess
StackWalk
SymGetSymFromAddr
SymUnDName
SymGetModuleInfo
sqlunirl
_GetUnicodeRedirectionLayer@0
_GetProcAddress_@8
_LoadString@16
_FormatMessage@28
_GetVersionEx@4
kernel32
GetThreadLocale
Sleep
SetErrorMode
QueryPerformanceFrequency
GlobalMemoryStatus
GetVersionExA
GetSystemInfo
WriteFile
lstrlenA
HeapFree
CloseHandle
FlushFileBuffers
GetLocaleInfoA
HeapAlloc
GetProcessHeap
GetCurrentProcess
GetEnvironmentVariableA
SetFilePointer
CreateFileA
GetModuleFileNameA
GetSystemDefaultLCID
GetModuleHandleA
FreeLibrary
lstrcpyA
ExpandEnvironmentStringsA
LoadLibraryA
GetACP
GetLastError
GetSystemDefaultLangID
MultiByteToWideChar
WideCharToMultiByte
ResetEvent
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEvent
InterlockedIncrement
GetStdHandle
InterlockedDecrement
WaitForSingleObject
WaitForMultipleObjects
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
AllocConsole
GetCurrentThreadId
CreateEventA
GetCommandLineA
RaiseException
InterlockedExchange
FormatMessageA
ExitProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
ReadProcessMemory
user32
MessageBoxA
wsprintfA
advapi32
DeregisterEventSource
MakeSelfRelativeSD
GetSecurityDescriptorLength
GetTokenInformation
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
IsValidSid
GetLengthSid
CopySid
RegSetValueExA
RegisterEventSourceA
ReportEventA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
OpenProcessToken
ole32
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoUninitialize
CoInitializeSecurity
CoInitializeEx
oleaut32
SysStringLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
msvcp71
?_Nomemory@std@@YAXXZ
msvcr71
_cexit
_XcptFilter
_exit
_c_exit
_callnewh
memset
_controlfp
exit
__dllonexit
__security_error_handler
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_resetstkoflw
_iob
freopen
printf
fclose
_onexit
wcschr
wprintf
_except_handler3
free
??3@YAXPAX@Z
??_V@YAXPAX@Z
sprintf
strchr
asctime
localtime
time
_strnicmp
_stricmp
wcsncat
wcslen
wcscpy
wcsncpy
_purecall
malloc
__p___initenv
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.brdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE