polstore.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8342c0d26a8afe0eb4b4624a42541ae9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8342c0d26a8afe0eb4b4624a42541ae9_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
8342c0d26a8afe0eb4b4624a42541ae9_JaffaCakes118
-
Size
136KB
-
MD5
8342c0d26a8afe0eb4b4624a42541ae9
-
SHA1
1cb664f25ffdce746c26f788dd16a1091b20e02e
-
SHA256
24c0f3fb7e1ab9477a37dae2e38cc0c4af262d06c453cbc70d0013b846b063b5
-
SHA512
e6d8e33c13f60c3055bdd2625452728b09661098f2dddeb1e8649b1908bbbd55be5cb7780cb414832cd74c0f5d6fce7f97cabf2b6fc071e32fd6b14253f5d347
-
SSDEEP
3072:sR4oyBdvpg/MCY00a8oIvlSzN9B8WnqC1MgwmVItRtaLl7yXIyAIya3tNG2mEk/d:voyBdvpg/MCY0p8oINSzN4yqCagXItRq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8342c0d26a8afe0eb4b4624a42541ae9_JaffaCakes118
Files
-
8342c0d26a8afe0eb4b4624a42541ae9_JaffaCakes118.exe windows:5 windows x86 arch:x86
857682706f3c5978714a7d0655236dc7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_CIpow
_except_handler3
_ltow
_vsnwprintf
_ftol
__CxxFrameHandler
kernel32
CreateFileW
CompareFileTime
lstrlenW
GetSystemTimeAsFileTime
WaitForSingleObject
ResetEvent
SystemTimeToFileTime
GetSystemTime
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetLastError
LoadLibraryW
InterlockedCompareExchange
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
MulDiv
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetProcAddress
GetFileSize
GetEnvironmentStrings
lstrlenA
FreeEnvironmentStringsW
FreeEnvironmentStringsA
DeviceIoControl
GetLocalTime
GetVersionExA
GetModuleHandleW
GetSystemInfo
GetProcessHeap
FormatMessageW
InterlockedDecrement
LocalFree
CloseHandle
HeapAlloc
HeapFree
InterlockedExchange
Sleep
GetModuleHandleA
DelayLoadFailureHook
DeleteCriticalSection
InitializeCriticalSection
CreateEventW
SetEvent
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
GetEnvironmentStringsW
GetDiskFreeSpaceA
GlobalMemoryStatus
TerminateProcess
gdi32
CreateDIBitmap
user32
LoadStringW
ReleaseDC
GetDC
ole32
CoCreateInstance
CoTaskMemAlloc
PropVariantCopy
CoTaskMemFree
CoTaskMemRealloc
PropVariantClear
msvfw32
ICGetInfo
ICClose
ICLocate
activeds
DllCanUnloadNow
ReallocADsMem
AdsTypeToPropVariant2
ADsBuildVarArrayStr
FreeADsMem
FreeADsStr
ADsOpenObject
ADsGetObject
ADsEnumerateNext
AllocADsMem
AdsFreeAdsValues
advapi32
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 194KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ