C:\BUILD_AREA\jdk6\control\build\windows-i586\tmp\deploy\javaws\bin\javaws.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b048d883ededcd5dfe4bf59623e39c0e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b048d883ededcd5dfe4bf59623e39c0e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b048d883ededcd5dfe4bf59623e39c0e_JaffaCakes118
-
Size
136KB
-
MD5
b048d883ededcd5dfe4bf59623e39c0e
-
SHA1
2d3737f7a28ba499b608d5116147b2d1d55182fb
-
SHA256
4ced30ee1fe05806a46b4c2b74c943dfc486a45070bc02a520f54a808e5c07f3
-
SHA512
c1efce3071f95e96b6c9fb8ace3d67b8ad47abf58803cd4779674c5abf78869924dd45d70825a0f1151852d6b03b5b160a93df521c3617375cd70684cb23cc55
-
SSDEEP
3072:Y4elsUeaEXW6BQZv6NSgapKbDsnplerDRBjZqMNb:YpyrZdBQZvGakbHxvb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b048d883ededcd5dfe4bf59623e39c0e_JaffaCakes118
Files
-
b048d883ededcd5dfe4bf59623e39c0e_JaffaCakes118.exe windows:4 windows x86 arch:x86
3bd3c8ab805e675e9ee8d991d6c37b33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetThreadLocale
WideCharToMultiByte
GlobalAlloc
MultiByteToWideChar
ReadFile
CloseHandle
WaitForSingleObject
CreateProcessA
SetHandleInformation
CreatePipe
CreateDirectoryA
GetWindowsDirectoryA
FindClose
GetModuleFileNameA
GetModuleHandleA
GetVersionExA
SetEnvironmentVariableW
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetTickCount
LoadLibraryA
GetProcAddress
FindFirstFileA
FreeLibrary
GetCurrentProcessId
QueryPerformanceCounter
GetTimeZoneInformation
FlushFileBuffers
HeapSize
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemInfo
VirtualProtect
InitializeCriticalSection
GetOEMCP
GetACP
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetLastError
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
GetFileType
CreateFileA
GetStartupInfoA
GetCommandLineA
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetStringTypeA
GetStringTypeW
WriteFile
SetStdHandle
SetHandleCount
GetStdHandle
GetFileAttributesA
SetEndOfFile
SetFilePointer
RtlUnwind
InterlockedExchange
VirtualQuery
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetLocaleInfoA
GetExitCodeProcess
user32
wsprintfA
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
CreateWindowExA
RegisterClassA
LoadCursorA
MessageBoxA
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
wsock32
listen
getsockname
accept
recv
bind
socket
ioctlsocket
htons
connect
send
WSAGetLastError
WSAStartup
closesocket
WSAAsyncSelect
ntohs
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
��xXCN Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE