rdpsign.pdb
Behavioral task
behavioral1
Sample
b1646f45901b1798584935f584d70f09_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
b1646f45901b1798584935f584d70f09_JaffaCakes118
-
Size
200KB
-
MD5
b1646f45901b1798584935f584d70f09
-
SHA1
3e4ec59d24c73e1be97439b8fda0eb940cde6942
-
SHA256
5b19b0eb2f63a7a6c0e543600824864c426b688f586c575af9cc87eff8325960
-
SHA512
1f79e8ef49907405a505d7f8445f88fb626123664439c7e2796f66fc2bf39dc63fc51b4f74dcacd287a5d22c2dae149ef5187a8f2218307cdaf075d99d493d67
-
SSDEEP
6144:Rhy1w8gpVG5uiCjQgjpgQ/xpbeDvOjeVhvgB0spy1O:ryOGZxKL/xpaHnOEE
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1646f45901b1798584935f584d70f09_JaffaCakes118
Files
-
b1646f45901b1798584935f584d70f09_JaffaCakes118.exe windows:6 windows x86 arch:x86
3e20b456453f355a9e71b01f6f9639cb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SystemTimeToFileTime
GetSystemTime
SetFilePointer
CreateFileW
GetFileAttributesW
WideCharToMultiByte
WriteFile
MultiByteToWideChar
ReadFile
GetFileSize
CloseHandle
InterlockedDecrement
InterlockedIncrement
GetLastError
GetModuleHandleA
GetModuleHandleW
GetConsoleOutputCP
SetThreadPreferredUILanguages
LocalAlloc
LocalFree
CopyFileW
DeleteFileW
GetTempPathW
GetTempFileNameW
msvcrt
_unlock
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
memcpy
_exit
_cexit
__wgetmainargs
malloc
_callnewh
_CxxThrowException
free
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@XZ
setlocale
swprintf_s
_wsetlocale
__dllonexit
toupper
fwprintf
__iob_func
_vsnwprintf
towlower
_wtol
_wcslwr
wcstok_s
_lock
_onexit
?terminate@@YAXXZ
_wfopen_s
fputws
iswdigit
iswxdigit
towupper
_except_handler4_common
_controlfp
memset
_purecall
fclose
_XcptFilter
user32
LoadStringW
shlwapi
StrCmpW
oleaut32
SysAllocStringLen
SysFreeString
crypt32
CryptStringToBinaryW
CryptBinaryToStringW
CryptVerifyDetachedMessageSignature
CryptSignMessage
CryptMsgOpenToDecode
CertDuplicateCertificateContext
CertDuplicateCertificateChain
CertVerifyCertificateChainPolicy
CryptMsgClose
CertFreeCertificateContext
CertGetCertificateChain
CertFreeCertificateChain
CertGetCertificateContextProperty
CertGetEnhancedKeyUsage
CertOpenStore
CertFindCertificateInStore
CertCloseStore
CertFindExtension
CryptDecodeObject
CryptMsgUpdate
advapi32
TraceMessage
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE