c:\mmp_koreasys1\module\setup\atlexe\Release\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
af61d3b7d854b218b09cedb507e2a9c5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af61d3b7d854b218b09cedb507e2a9c5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
af61d3b7d854b218b09cedb507e2a9c5_JaffaCakes118
-
Size
32KB
-
MD5
af61d3b7d854b218b09cedb507e2a9c5
-
SHA1
7fb2e0724eed9445fa2fefc3c554155a2dc18f94
-
SHA256
9ffe3991caf64b178c8e38c4689061dd6130db6f553f4836a073534ac8dbcc17
-
SHA512
296e32405823f54ad78cd955ca7f12b3b3273fea7aa937e952d095069d2fe33c8de933b96997790d1dff870bbd59c4f884269b86d6fba4af410390642af0f379
-
SSDEEP
768:W012SA3s/Ld/Ep84ls1s2g28s2/Y5+nVA8VsOR:z12SASL6pDmbmYSA8SOR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource af61d3b7d854b218b09cedb507e2a9c5_JaffaCakes118
Files
-
af61d3b7d854b218b09cedb507e2a9c5_JaffaCakes118.exe windows:5 windows x86 arch:x86
12684530c86c37d0b7e1964621033c91
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatA
lstrcpyA
GetLastError
GetCurrentProcess
CreateMutexA
MoveFileA
lstrlenA
DeleteFileA
CreateDirectoryA
GetTempPathA
GetCommandLineA
GetModuleFileNameA
Sleep
GetLocalTime
GetTickCount
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
ExpandEnvironmentStringsA
CreateThread
WaitForSingleObject
TerminateThread
CloseHandle
GetFileAttributesExA
RemoveDirectoryA
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
user32
FindWindowA
wsprintfA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyA
shell32
ShellExecuteA
ole32
CoInitialize
shlwapi
PathRemoveBlanksA
PathFileExistsA
PathIsDirectoryA
PathGetArgsA
PathFindFileNameA
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
ws2_32
send
select
connect
ioctlsocket
closesocket
__WSAFDIsSet
recv
htons
socket
gethostbyname
WSAStartup
netapi32
Netbios
msvcr90
_crt_debugger_hook
_except_handler4_common
_invoke_watson
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_stricmp
_ismbblead
??3@YAXPAX@Z
strstr
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
__CxxFrameHandler3
memcpy
isalpha
tolower
_invalid_parameter_noinfo
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
??2@YAPAXI@Z
fclose
fwrite
fopen
sprintf
atoi
strncpy
memset
strtok
rand
srand
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ