earthflashsol.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b84c2433daccfc897234dfcd79a8e055_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b84c2433daccfc897234dfcd79a8e055_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b84c2433daccfc897234dfcd79a8e055_JaffaCakes118
-
Size
302KB
-
MD5
b84c2433daccfc897234dfcd79a8e055
-
SHA1
d60307175a360f264dedf61d86539ed346535abc
-
SHA256
0fb4cf158355f155f7cc126726f3cb7558ef58dbee01f8e668a499fb81ec36b3
-
SHA512
32c8dc16c4e741b3029ef0ae225b77241dfc4db88e45557cea71e8c9c64694c096d4f7a7c86b0b72264c2a01befe64f5c9a86171c20b98a632a09b1e055c08ac
-
SSDEEP
6144:37IZks6zJEcwBOgo92AabYSzCkL3Z9g5KKiJrgDz+Y9Gp0JYuP9JB/HcZ:37nzn/9Zab/Ck9qghJrEz+Y4qFnB2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b84c2433daccfc897234dfcd79a8e055_JaffaCakes118
Files
-
b84c2433daccfc897234dfcd79a8e055_JaffaCakes118.exe windows:4 windows x86 arch:x86
bf2348d4c6583a52da9490e2d6a17acf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcp80
?push_back@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXD@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@V32@D@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@D@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_WI@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?_Throw@std@@YAXABVexception@stdext@@@Z
?_Raise_handler@std@@3P6AXABVexception@stdext@@@ZA
msvcr80
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
_invoke_watson
_controlfp_s
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_wfsopen
memmove
wcscpy
strchr
wcslen
memset
_wcsnicmp
_wfopen
memmove_s
setvbuf
memcmp
_fileno
ftell
memcpy
_errno
fread
feof
_purecall
??_V@YAXPAX@Z
fseek
fwrite
isalpha
fclose
_invalid_parameter_noinfo
??3@YAXPAX@Z
strlen
??2@YAPAXI@Z
_fstat64i32
_strnicmp
kernel32
TlsSetValue
EnterCriticalSection
GetTempFileNameW
GetDiskFreeSpaceExW
GetProcAddress
CopyFileW
TlsAlloc
GetFileAttributesExW
RemoveDirectoryW
MultiByteToWideChar
LeaveCriticalSection
IsDebuggerPresent
FreeLibrary
CloseHandle
GetTickCount
DeleteCriticalSection
WideCharToMultiByte
GetModuleFileNameW
SetThreadPriority
MoveFileW
TlsFree
FindNextFileW
ResumeThread
TlsGetValue
FindClose
GetCurrentThreadId
DeleteFileW
CreateDirectoryW
CreateThread
GetFileAttributesW
GetLastError
GetTempPathW
GetDriveTypeW
LoadLibraryA
InitializeCriticalSection
WaitForSingleObject
GetLongPathNameW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FindFirstFileW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathW
ws2_32
getsockopt
WSACleanup
htonl
WSAResetEvent
sendto
inet_addr
WSAEnumNetworkEvents
setsockopt
connect
ioctlsocket
send
ntohl
WSACreateEvent
WSAGetLastError
recv
recvfrom
htons
socket
WSAStartup
getpeername
getsockname
gethostbyname
closesocket
WSASetEvent
ntohs
WSACloseEvent
WSAWaitForMultipleEvents
bind
WSAEventSelect
listen
accept
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 253KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE