unsecapp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab81a8733d9f69145e74f964345b1ee4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ab81a8733d9f69145e74f964345b1ee4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab81a8733d9f69145e74f964345b1ee4_JaffaCakes118
-
Size
103KB
-
MD5
ab81a8733d9f69145e74f964345b1ee4
-
SHA1
672cf0da02bb3f0fa5dd5ba97f5000ab1b8ef881
-
SHA256
280bdf2b0a7c62275c914786143fa99361be56d233878aa4a14a942b77583574
-
SHA512
723fed59e2cf31c6612159b569a70d88799af0602ef1560a4710d034dc5dcf524878468f4778407fc79492cd85d5e31045f1563abdbb98efb0ce1f7f2a726d3e
-
SSDEEP
3072:sy6jhdO3R9f2gCkQf/XZTnMby07Y3vFPmp2F:sZ3g9fTpQf/XZTnAY1F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab81a8733d9f69145e74f964345b1ee4_JaffaCakes118
Files
-
ab81a8733d9f69145e74f964345b1ee4_JaffaCakes118.exe windows:5 windows x86 arch:x86
443edb17d35a0b28fba9d5e5ad84a9aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
??3@YAXPAX@Z
?terminate@@YAXXZ
??2@YAPAXI@Z
_onexit
__dllonexit
_controlfp
??1type_info@@UAE@XZ
_except_handler3
__set_app_type
__CxxFrameHandler
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
_CxxThrowException
printf
wcsstr
_vsnwprintf
_purecall
advapi32
CreateServiceW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
OpenSCManagerW
DeleteService
OpenServiceW
RegSetValueExW
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
RegOpenKeyW
IsValidSid
GetLengthSid
EqualSid
kernel32
ExitProcess
SetEvent
GetLastError
CreateEventW
GetModuleFileNameW
lstrlenW
GetCommandLineW
SetUnhandledExceptionFilter
EnterCriticalSection
DebugBreak
InitializeCriticalSectionAndSpinCount
LCMapStringW
LeaveCriticalSection
InterlockedIncrement
DeleteCriticalSection
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
wbemcomn
??0CNtSid@@QAE@PAX@Z
??0Registry@@QAE@PAGK@Z
?GetDWORDStr@Registry@@QAEHPAGPAK@Z
??1Registry@@QAE@XZ
??0CCritSec@@QAE@XZ
??1CCritSec@@QAE@XZ
?ErrorTrace@@YAHDPBDZZ
??0CNtSid@@QAE@W4SidType@0@@Z
??0CInCritSec@@QAE@PAU_RTL_CRITICAL_SECTION@@@Z
??8CNtSid@@QAEHAAV0@@Z
?GetTextSid@CNtSid@@QAEHPAGPAK@Z
??1CInCritSec@@QAE@XZ
??0CNtSid@@QAE@ABV0@@Z
??4CNtSid@@QAEAAV0@ABV0@@Z
??0CUnk@@QAE@PAVCLifeControl@@PAUIUnknown@@@Z
??1CUnk@@UAE@XZ
?QueryInterface@CUnk@@UAGJABU_GUID@@PAPAX@Z
?AddRef@CUnk@@UAGKXZ
?Release@CUnk@@UAGKXZ
?OnInitialize@CUnk@@UAEHXZ
?Initialize@CUnk@@UAEHXZ
??_7CUnkInternal@@6B@
??0CUnkInternal@@QAE@PAVCLifeControl@@@Z
??1CUnkInternal@@UAE@XZ
?QueryInterface@CUnkInternal@@UAGJABU_GUID@@PAPAX@Z
?InternalRelease@CUnkInternal@@QAEKXZ
?InternalQueryInterface@CUnkInternal@@QAEJABU_GUID@@PAPAX@Z
?AddRef@CUnkInternal@@UAGKXZ
?Release@CUnkInternal@@UAGKXZ
??1CNtSid@@QAE@XZ
ole32
CoImpersonateClient
CoRevertToSelf
CoInitialize
CoInitializeSecurity
CoRegisterClassObject
StringFromGUID2
CoRevokeClassObject
user32
SetTimer
DispatchMessageW
TranslateMessage
GetMessageW
PostThreadMessageW
PostQuitMessage
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1016B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE