e:\src\upgradelauncher\rel32\realupgrade.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c23209ead9fca21515516da89a1b1c1a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c23209ead9fca21515516da89a1b1c1a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c23209ead9fca21515516da89a1b1c1a_JaffaCakes118
-
Size
164KB
-
MD5
c23209ead9fca21515516da89a1b1c1a
-
SHA1
fe8f08acfde6bda1f991af5fbb8f326f1d0e3d52
-
SHA256
f37c650f3d48348b06a1142d05b0b4439f47da203ca97cb21cc92f34a8e4bc19
-
SHA512
ab14caa202ee4cad2725a6f456f4cbb6b6a58f80a249f7237b9241f77edb59a617c33ce79efedc0dfaee9256db98c9e1b86faf30a21e5e6a650b7f6e892739c1
-
SSDEEP
3072:UzeB5mPg6u3V1NtN0V7pvnaCOSxKpf3fo:fLZJ3V1P2V7pfaCOSc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c23209ead9fca21515516da89a1b1c1a_JaffaCakes118
Files
-
c23209ead9fca21515516da89a1b1c1a_JaffaCakes118.exe windows:4 windows x86 arch:x86
49a3412c1cb0d18b78118656f471937c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ole32
OleUninitialize
OleInitialize
user32
RegisterClassExA
CreateWindowExA
GetWindowLongA
DefWindowProcA
SetWindowLongA
GetClassInfoExA
SendMessageA
RegisterWindowMessageA
DestroyWindow
FindWindowA
UnregisterClassA
GetSystemMetrics
CharNextA
ReleaseDC
GetDC
msvcr71
__dllonexit
_putenv
printf
??3@YAXPAX@Z
strrchr
strncpy
malloc
free
memset
memmove
realloc
sprintf
_vsnprintf
??2@YAPAXI@Z
strstr
strtol
getenv
atoi
_mbctype
_stricmp
vsprintf
asctime
gmtime
time
__security_error_handler
_except_handler3
_CxxThrowException
?terminate@@YAXXZ
_controlfp
_onexit
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
wcslen
__CxxFrameHandler
_purecall
kernel32
GetCurrentProcess
GetCurrentThreadId
CreateThread
TerminateThread
SetUnhandledExceptionFilter
IsBadReadPtr
VirtualProtect
IsBadWritePtr
GetCurrentDirectoryA
SetCurrentDirectoryA
SetFilePointer
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentProcessId
GetTickCount
MoveFileA
CreateDirectoryA
GetFileAttributesA
CreateFileA
DeleteFileA
VirtualQuery
FreeLibrary
InterlockedDecrement
InterlockedIncrement
OpenProcess
GlobalMemoryStatus
SetEnvironmentVariableA
WriteFile
GetEnvironmentVariableA
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
GetProcAddress
GetModuleHandleA
LocalFree
GetCommandLineW
ReleaseMutex
CloseHandle
WaitForSingleObject
CreateMutexA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetStartupInfoA
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleFileNameA
GetThreadContext
LoadLibraryA
SetErrorMode
shell32
SHGetFolderPathA
CommandLineToArgvW
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetFileSecurityA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shlwapi
PathAppendA
PathAddBackslashA
PathStripToRootA
version
GetFileVersionInfoA
VerQueryValueA
gdi32
GetDeviceCaps
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE