D:\VSCORE1\BUILD\VSCore\release\McShield.pdb
Behavioral task
behavioral1
Sample
955dd6b83b5159ba99ab53f061b1bafb_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
955dd6b83b5159ba99ab53f061b1bafb_JaffaCakes118
-
Size
280KB
-
MD5
955dd6b83b5159ba99ab53f061b1bafb
-
SHA1
8bb066698da2a90b23e20737a89fa3abd5da9026
-
SHA256
6ac763088874540e613a779f22e7e54758e5cd777fd8aaa6cec49e64f6b3ec35
-
SHA512
521b835a0f7d144887a8cf2bbc4c07d93fbe67cda1620e2e73d8b72bb8dad2f12b3001e2fd09a0f091231f9893e3fdd033481d1c93c3060904e807bb1483fc1c
-
SSDEEP
6144:PvgRnyncIgUOUssIss1vURsQ6A0yUX2kgVQllv6rZVNp:PvCyncX2ssU1vsR0yUX25KlvIVb
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 955dd6b83b5159ba99ab53f061b1bafb_JaffaCakes118
Files
-
955dd6b83b5159ba99ab53f061b1bafb_JaffaCakes118.exe windows:4 windows x86 arch:x86
35a5f56ed751ff1bf1b3a7712dc32efd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
lz32
LZOpenFileW
LZRead
LZClose
ws2_32
WSAStartup
lockdown
LockDownProtectService
mytilus
GetLogger
mytilus2
SetEngineCodepage
GetEngine2
kernel32
GetComputerNameW
CreateEventW
SetErrorMode
LoadLibraryExW
CreateFileW
DeviceIoControl
FormatMessageW
WideCharToMultiByte
ExitProcess
RaiseException
TerminateProcess
ResumeThread
GetThreadContext
SuspendThread
SetWaitableTimer
WaitForMultipleObjects
SetThreadPriority
DuplicateHandle
GetCurrentThread
CreateWaitableTimerW
SetUnhandledExceptionFilter
SetConsoleCtrlHandler
LocalFree
InitializeCriticalSection
MapViewOfFile
CreateFileMappingW
InterlockedDecrement
ExitThread
GetDriveTypeW
lstrlenW
SetEnvironmentVariableW
DeleteCriticalSection
GetCurrentProcessId
TryEnterCriticalSection
ResetEvent
GetSystemInfo
SetPriorityClass
LoadLibraryA
FindClose
FindNextFileW
FindFirstFileW
GetSystemDefaultLCID
GetUserDefaultLCID
GetThreadLocale
ReadFile
SetFilePointer
DebugBreak
GetVersionExW
GetCurrentProcess
GetModuleFileNameW
IsBadReadPtr
UnmapViewOfFile
WaitForSingleObject
OpenEventW
SetEvent
EnterCriticalSection
LeaveCriticalSection
CreateThread
CloseHandle
GetModuleHandleW
IsBadStringPtrW
GetLocalTime
GetCurrentThreadId
GetTickCount
InterlockedExchange
Sleep
InterlockedIncrement
GetSystemTimeAsFileTime
LoadLibraryW
GetLastError
GetProcAddress
FreeLibrary
QueryPerformanceCounter
ExpandEnvironmentStringsW
UnhandledExceptionFilter
user32
MessageBoxW
GetSystemMetrics
PostMessageW
LoadStringW
RegisterClassW
GetMessageW
DispatchMessageW
GetWindowLongW
SetWindowLongW
DefWindowProcW
wsprintfW
CreateWindowExW
CharUpperW
advapi32
RegOpenKeyExW
RegCloseKey
OpenServiceW
CloseServiceHandle
SetServiceStatus
GetSidLengthRequired
LookupAccountNameW
ReportEventW
DeregisterEventSource
RegisterEventSourceW
RegNotifyChangeKeyValue
GetKernelObjectSecurity
GetSecurityDescriptorDacl
RegQueryValueExW
StartServiceW
ControlService
OpenSCManagerW
SetSecurityDescriptorDacl
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeAcl
InitializeSecurityDescriptor
GetUserNameW
SetThreadToken
DuplicateToken
GetTokenInformation
RevertToSelf
OpenThreadToken
GetLengthSid
IsValidSid
CopySid
AdjustTokenPrivileges
StartServiceCtrlDispatcherW
LookupPrivilegeValueW
OpenProcessToken
SetKernelObjectSecurity
AddAce
GetAce
GetAclInformation
RegisterServiceCtrlHandlerW
ole32
CoInitializeEx
msvcrt
_controlfp
_wcsnicmp
__set_app_type
__p__fmode
qsort
wcslen
wcscat
wcscpy
_except_handler3
wcscmp
wcsncpy
_purecall
_vsnwprintf
wcschr
_snwprintf
swprintf
_wcsicmp
wcsrchr
__p__commode
sscanf
malloc
printf
wcsstr
swscanf
memmove
strncpy
scanf
realloc
towupper
free
iswctype
towlower
wprintf
_wcslwr
_wcsdup
__dllonexit
_onexit
_c_exit
_exit
_XcptFilter
_cexit
exit
__winitenv
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
ntdll
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
ZwClose
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bldvar Size: 4KB - Virtual size: 18B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE