rdshost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
842dbb9915c80631fd0befa01144d5c7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
842dbb9915c80631fd0befa01144d5c7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
842dbb9915c80631fd0befa01144d5c7_JaffaCakes118
-
Size
75KB
-
MD5
842dbb9915c80631fd0befa01144d5c7
-
SHA1
9feef60fd79f5071bfe3138c21cc5e21faf1f921
-
SHA256
004abc9fbd3f831d9a96a8e33b4e400e8d4190fd690ba0940ef102d2c520f061
-
SHA512
0977afad5ca8be25a662be83f0a7f3682b4a041179c27ea08e65e8709c975f1b06fc45c87475be34e15f8b07d94e8c3293c68ad3539024a176ea2cd06c58f10d
-
SSDEEP
1536:gwflcQMy5YI1G4tduxsda+YfKYiGGKSuG7zC3jC21Tsvx+:7lcYYDIuxsxYziGZSDa3j71e8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 842dbb9915c80631fd0befa01144d5c7_JaffaCakes118
Files
-
842dbb9915c80631fd0befa01144d5c7_JaffaCakes118.exe windows:5 windows x86 arch:x86
0ea6889cceb05f6e6c36cf5a3bed4897
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_c_exit
_exit
_XcptFilter
_cexit
exit
wcscmp
__wgetmainargs
_controlfp
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__CxxFrameHandler
_CxxThrowException
??2@YAPAXI@Z
realloc
free
malloc
_purecall
_wcmdln
wcslen
wcstok
_wtoi
_wtol
wcschr
_initterm
??3@YAXPAX@Z
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
advapi32
FreeSid
LookupAccountNameW
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
OpenThreadToken
EqualSid
AllocateAndInitializeSid
OpenProcessToken
RegEnumKeyExW
GetTokenInformation
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSid
GetLengthSid
CopySid
InitializeSecurityDescriptor
RegEnumValueW
RegQueryInfoKeyW
ConvertSidToStringSidW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
kernel32
WriteFile
ReadFile
SetLastError
CreateNamedPipeW
LocalFree
WideCharToMultiByte
GetACP
LocalAlloc
ProcessIdToSessionId
GetCurrentProcessId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoW
ConnectNamedPipe
EnterCriticalSection
MultiByteToWideChar
lstrlenW
lstrcpyW
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
SetEvent
CloseHandle
WaitForSingleObject
lstrcmpiW
lstrcpynW
HeapDestroy
lstrcatW
GetModuleFileNameW
GetLastError
CreateThread
CreateEventW
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
GetCurrentThread
lstrlenA
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetShortPathNameW
Sleep
GetCurrentThreadId
GetCommandLineW
LeaveCriticalSection
GetOverlappedResult
DisconnectNamedPipe
ResetEvent
FlushFileBuffers
user32
PostThreadMessageW
DispatchMessageW
GetMessageW
wsprintfW
CharNextW
winsta
WinStationConnectCallback
ole32
CoImpersonateClient
CoRevertToSelf
CoSetProxyBlanket
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
oleaut32
SysFreeString
SysAllocString
VarUI4FromStr
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
SysStringLen
SysAllocStringLen
VariantClear
SysAllocStringByteLen
SysStringByteLen
wsock32
htons
ioctlsocket
gethostbyname
WSAStartup
WSACleanup
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WYCao Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ