gpscript.pdb
Behavioral task
behavioral1
Sample
742f7b86ee02ca8975d1d872b479204b_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
742f7b86ee02ca8975d1d872b479204b_JaffaCakes118
-
Size
132KB
-
MD5
742f7b86ee02ca8975d1d872b479204b
-
SHA1
5541cff408ba3312b8666c9a6b8fdf0af61635ac
-
SHA256
52899d685de4d3ddd9b16b3b1e07249d911d6dc07a3c0075a5508660536b8d1e
-
SHA512
8ca096b84ec57b89fe146810650eccabec41a958baca13360216c9834938da2f7b94a4152bcc533e83736600f267a5700d99ea06eafcb0f55b19378877c83990
-
SSDEEP
3072:obgtOA7IFQA3dKfPrTMpEWPF/2UWCmWQAnDaiPSTTGtU:obgR2QA3wWpWCm7AWYSTTGtU
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 742f7b86ee02ca8975d1d872b479204b_JaffaCakes118
Files
-
742f7b86ee02ca8975d1d872b479204b_JaffaCakes118.exe windows:6 windows x86 arch:x86
919b0e5cd4355703088af6f0a865e7b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetSystemMetrics
UpdatePerUserSystemParameters
ntdll
RtlDosPathNameToRelativeNtPathName_U
RtlReleaseRelativeName
RtlFreeHeap
NtCreateFile
NtClose
RtlIsDosDeviceName_U
RtlNtStatusToDosError
RtlLengthSid
RtlCopySid
shell32
CommandLineToArgvW
advapi32
GetTokenInformation
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyExW
RegSetValueExW
RegQueryValueExW
OpenProcessToken
ImpersonateLoggedOnUser
OpenThreadToken
SetThreadToken
ConvertSidToStringSidW
EqualSid
kernel32
GetFullPathNameW
CreateDirectoryW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
GetCommandLineW
CloseHandle
GetLastError
SetEnvironmentVariableW
LocalAlloc
lstrlenW
LocalFree
FreeLibrary
GetProcAddress
LoadLibraryW
CompareFileTime
GetEnvironmentVariableW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
ExpandEnvironmentStringsW
SetCurrentDirectoryW
GetSystemDirectoryW
GetSystemTime
SetLastError
GetCurrentProcess
GlobalFree
CompareStringW
UnhandledExceptionFilter
HeapSetInformation
WriteFile
SetFilePointer
CreateFileW
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
MoveFileExW
GetFileAttributesExW
DuplicateHandle
GetCurrentThread
SetFileAttributesW
msvcrt
__setusermatherr
_vsnwprintf
memmove
memset
_itow
??3@YAXPAX@Z
__CxxFrameHandler3
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_amsg_exit
_initterm
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE