d:\A\HEAD\exe\vsa64\release\schedul2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b245ed377508f01bf6a70dd2d550c6c5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b245ed377508f01bf6a70dd2d550c6c5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b245ed377508f01bf6a70dd2d550c6c5_JaffaCakes118
-
Size
622KB
-
MD5
b245ed377508f01bf6a70dd2d550c6c5
-
SHA1
c471fda514c4636e3d0621de149bb979eb949764
-
SHA256
af6a6786793afcaf681887ddb812cb14562d73d6bd6214ba99bef5ae379e1bbf
-
SHA512
0d24dd97c4e022d04727d8125626097a6b855ad2c56d56fa977b4c0017736613977d075546245df6185f25026d51c6ba9f2a2e4581ed4da348503c6d3ba2b24c
-
SSDEEP
12288:O1TYdOxqISIOdpvIZ6CawDJbkuzA5mn9oIGASS5:CNSIOdpvIZ6CnJbkuzA5m94AN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b245ed377508f01bf6a70dd2d550c6c5_JaffaCakes118
Files
-
b245ed377508f01bf6a70dd2d550c6c5_JaffaCakes118.exe windows:4 windows x64 arch:x64
7b4aea28f4bdbba285ed9e4e96bcc26a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
AllocateAndInitializeSid
FreeSid
LookupAccountSidW
RegDeleteKeyA
RegSetKeySecurity
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
OpenThreadToken
RegQueryValueExW
GetTokenInformation
AllocateLocallyUniqueId
RegSetValueExW
RevertToSelf
ImpersonateLoggedOnUser
LogonUserW
CreateProcessAsUserW
SetTokenInformation
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
RegCreateKeyExW
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegDeleteValueW
OpenProcessToken
IsValidSid
AdjustTokenPrivileges
LookupPrivilegeValueA
CopySid
GetLengthSid
LookupPrivilegeNameW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyW
QueryServiceConfigW
QueryServiceStatus
OpenServiceW
RegEnumKeyExW
RegOpenKeyExW
StartServiceA
SetSecurityDescriptorOwner
SetKernelObjectSecurity
RegEnumValueW
GetUserNameW
SetFileSecurityW
GetSecurityDescriptorOwner
GetFileSecurityW
DecryptFileW
EncryptFileW
SetThreadToken
CloseEncryptedFileRaw
OpenEncryptedFileRawW
ReadEncryptedFileRaw
WriteEncryptedFileRaw
kernel32
TerminateThread
WaitForSingleObject
GetLastError
TerminateProcess
lstrcmpiW
GetVersion
ReadProcessMemory
OpenProcess
lstrcmpiA
GetCurrentThread
FreeLibrary
GetProcAddress
LoadLibraryA
Sleep
GetDiskFreeSpaceExA
SetLastError
GetExitCodeProcess
GetComputerNameW
__C_specific_handler
GetTimeZoneInformation
GetModuleHandleA
LocalFree
FormatMessageW
SetUnhandledExceptionFilter
GetCurrentProcess
CreateProcessW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ResetEvent
GetSystemInfo
GetModuleFileNameW
LocalAlloc
GetTickCount
CreateFileW
HeapFree
HeapAlloc
WaitForMultipleObjects
FindNextFileW
FindFirstFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetTempPathW
GetTempFileNameW
GetLogicalDriveStringsW
GetDriveTypeW
GetSystemDirectoryW
GetWindowsDirectoryW
GetShortPathNameW
CreateDirectoryW
RemoveDirectoryW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
CopyFileW
MoveFileW
MoveFileExW
GetFullPathNameW
OutputDebugStringW
ExpandEnvironmentStringsW
LoadLibraryW
LoadLibraryExW
GetStartupInfoW
SetComputerNameW
GetLocaleInfoW
GetTimeFormatW
GetDateFormatW
GetNumberFormatW
WriteConsoleW
GetEnvironmentVariableW
SetEnvironmentVariableW
MultiByteToWideChar
WideCharToMultiByte
FindClose
GetDriveTypeA
GetLogicalDrives
SetErrorMode
GetWindowsDirectoryA
GetCurrentDirectoryA
GetCurrentThreadId
FindCloseChangeNotification
FindNextChangeNotification
ReadFile
WriteFile
FlushFileBuffers
SetFilePointer
SetEndOfFile
LockFileEx
UnlockFileEx
SetProcessWorkingSetSize
GetProcessWorkingSetSize
DeviceIoControl
SetFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
CompareStringW
FindFirstChangeNotificationW
CreateHardLinkW
GetVolumePathNameW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetDiskFreeSpaceW
GetCompressedFileSizeW
GetFileInformationByHandle
EnumResourceLanguagesW
LockResource
LoadResource
FindResourceExW
ExitThread
GetSystemDefaultLangID
EnumResourceNamesW
GetSystemTimeAsFileTime
BackupRead
BackupSeek
BackupWrite
GetFileTime
ReleaseSemaphore
CreateSemaphoreA
SetEnvironmentVariableA
CompareStringA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
CreateFileA
SetStdHandle
GetConsoleOutputCP
WriteConsoleA
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
HeapSize
IsDebuggerPresent
SetEvent
CloseHandle
CreateEventA
GetProcessHeap
HeapCreate
HeapSetInformation
FlsAlloc
FlsFree
FlsSetValue
FlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
CreateThread
ExitProcess
RtlPcToFileHeader
RaiseException
RtlUnwindEx
GetVersionExA
GetCommandLineA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcessId
QueryPerformanceCounter
user32
wsprintfW
RegisterClassExW
DefWindowProcW
GetWindowLongW
SetWindowLongW
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
CharUpperBuffW
WinHelpW
VkKeyScanExW
VkKeyScanW
SystemParametersInfoW
SetWindowTextW
ModifyMenuW
AppendMenuW
GetClipboardFormatNameW
RegisterClipboardFormatW
DispatchMessageW
PeekMessageW
CreateDialogIndirectParamW
PostMessageW
SendNotifyMessageW
SendMessageW
gdi32
EnumFontFamiliesExW
GetTextMetricsW
CreateFontIndirectW
shell32
SHGetPathFromIDListW
ord21
ShellExecuteExW
ShellExecuteW
ord645
ord644
SHGetMalloc
SHGetFolderPathW
ord4
ord2
SHGetDesktopFolder
comdlg32
GetSaveFileNameW
GetOpenFileNameW
mpr
WNetAddConnection3W
WNetGetUniversalNameW
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
WNetCancelConnection2W
ole32
CoUninitialize
OleUninitialize
CoInitialize
OleInitialize
CoCreateInstance
oleaut32
VariantInit
VariantChangeType
VariantClear
rpcrt4
I_RpcGetBuffer
NdrConformantArrayBufferSize
NdrConformantArrayUnmarshall
NdrConvert
NdrServerInitializeNew
RpcRevertToSelf
RpcImpersonateClient
RpcServerListen
RpcServerRegisterIf
RpcServerUnregisterIf
RpcServerUseProtseqEpA
NdrConformantArrayMarshall
RpcRaiseException
Sections
.text Size: 448KB - Virtual size: 447KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�T �oc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ