C:\BUILD_AREA\au\client\ws\obj\jusched\Release\jusched.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c2680b5689cf5e419c42ef7c6298a42c_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
c2680b5689cf5e419c42ef7c6298a42c_JaffaCakes118
-
Size
310KB
-
MD5
c2680b5689cf5e419c42ef7c6298a42c
-
SHA1
7852486ef4404bbe15008ec95308e31439614c17
-
SHA256
84a5aec6774b0b317b19c79a16cfb8bcf29a23370c92dc4cc75608dd5aa3b705
-
SHA512
b75794365f31ebd4cb82927348c9a1f482964215f7eb3b99b44250a2c20ec8e96b65f8640b5ca4f9367dca73b2a227bdc1b40b925be4ab708b5129a3992a2d54
-
SSDEEP
6144:uz1n3okbStWNcJeE+5gPh92ruEFj05ST3wJRPY2fk:UdokbStWAeDA2riGMxYuk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2680b5689cf5e419c42ef7c6298a42c_JaffaCakes118
Files
-
c2680b5689cf5e419c42ef7c6298a42c_JaffaCakes118.exe windows:5 windows x86 arch:x86
3f0d1508582cdb188613764121a267a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegNotifyChangeKeyValue
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegEnumKeyA
gdi32
GetStockObject
wininet
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
InternetConnectA
InternetOpenA
InternetCrackUrlA
InternetErrorDlg
InternetTimeToSystemTime
InternetTimeFromSystemTime
kernel32
SetEndOfFile
CreateFileW
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
lstrcmpA
CloseHandle
GetLastError
CreateProcessA
CreateMutexA
CreateEventA
lstrcatA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
InterlockedIncrement
InterlockedDecrement
lstrcmpiA
WaitForMultipleObjects
GetModuleFileNameA
WaitForSingleObject
GetCommandLineA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetThreadLocale
GetTempPathA
lstrcpyA
SetEvent
ResetEvent
CreateThread
lstrcpynA
ReadFile
SetHandleInformation
CreatePipe
WriteFile
Sleep
CreateFileA
GetProcAddress
LoadLibraryA
OpenEventA
GetSystemTime
DeleteFileA
GetVersionExA
GetCurrentProcess
GetSystemInfo
SetFilePointer
GetEnvironmentVariableA
LocalFree
SystemTimeToTzSpecificLocalTime
CompareFileTime
SystemTimeToFileTime
GetTickCount
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
InterlockedExchange
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
HeapSize
GetStdHandle
HeapCreate
HeapReAlloc
VirtualFree
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetTimeZoneInformation
GetStartupInfoA
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
VirtualQuery
GetModuleHandleW
VirtualAlloc
GetSystemTimeAsFileTime
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
user32
wsprintfA
CharNextA
PeekMessageA
DispatchMessageA
DispatchMessageW
TranslateMessage
GetMessageA
IsWindowUnicode
MsgWaitForMultipleObjects
LoadStringA
GetDesktopWindow
MessageBoxA
RegisterClassA
CreateWindowExA
ShowWindow
SetWindowLongA
DestroyWindow
GetWindowLongA
DefWindowProcA
PostQuitMessage
CreatePopupMenu
AppendMenuA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
PostMessageA
GetSystemMetrics
LoadImageA
GetMessageW
ole32
CoTaskMemRealloc
CoCreateInstance
CLSIDFromString
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
shell32
Shell_NotifyIconA
ShellExecuteA
oleaut32
VarUI4FromStr
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE