C:\OUT\Release\PDB\bitcoin-miner.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ce937ce8c23700a34235a6f1d82d3faa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce937ce8c23700a34235a6f1d82d3faa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce937ce8c23700a34235a6f1d82d3faa_JaffaCakes118
-
Size
971KB
-
MD5
ce937ce8c23700a34235a6f1d82d3faa
-
SHA1
cf51edc8959415b143e82d9fc055a528d3db2ed9
-
SHA256
337ea0fe52b78c6bbc861c0fe3461b2db403472388b309b609da1e658db56637
-
SHA512
d358179f977c0a8b80ab39ea13574ac7f7e61da145ab96745faabea903295d34f092a1ac6e702132f12f6e30d769ac3355ca575bfa5e62503535585f3463e164
-
SSDEEP
6144:fHdrbKeKOKaK4BKKK/KjKkqaOJJKpJy/J+Kpep6PqqqKKqudqqqKNaL3rS1JJK4C:fHJ8TesPukJFgNey8giRSBRFm3n88
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce937ce8c23700a34235a6f1d82d3faa_JaffaCakes118
Files
-
ce937ce8c23700a34235a6f1d82d3faa_JaffaCakes118.exe windows:5 windows x86 arch:x86
d0f0dc6f22f0421f54eae8a38bd1a246
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
printf
_stat
_fstat
_vsnwprintf
toupper
isalpha
_sys_nerr
_getcwd
_controlfp
__set_app_type
_purecall
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
__fpecode
_findnexti64
_findfirsti64
_fstati64
_stati64
ctime
gmtime
localtime
mktime
time
_ftime
_utime
strncmp
getenv
fprintf
__argc
__argv
__wargv
signal
raise
_findnext
_findfirst
_iob
strtod
isxdigit
isdigit
fputc
_pclose
fopen
setvbuf
sscanf
strstr
strftime
_open_osfhandle
_fdopen
fflush
fwrite
fread
feof
fgetc
ferror
ungetc
fclose
_get_osfhandle
_wsplitpath
_findclose
_beginthreadex
_endthreadex
_assert
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
isspace
isalnum
strchr
fseek
fsetpos
fgetpos
ldexp
_errno
strerror
memchr
iswspace
wcsstr
wcschr
realloc
malloc
_msize
free
memmove
sprintf
abort
_EH_prolog
_vsnprintf
atoi
_fileno
memcpy
_isatty
memset
?terminate@@YAXXZ
user32
CharToOemW
PostThreadMessageW
MessageBoxW
MessageBeep
EnumWindows
LoadStringW
GetSysColor
GetWindowLongW
GetWindowThreadProcessId
IsCharAlphaW
IsCharUpperW
IsCharLowerW
CharLowerW
CharUpperW
ole32
CoTaskMemAlloc
CLSIDFromString
StringFromGUID2
CoCreateGuid
CoUninitialize
CoFreeUnusedLibraries
CoTaskMemFree
CLSIDFromProgID
StringFromIID
StgCreateDocfile
StgOpenStorage
CoInitialize
CoCreateInstance
StringFromCLSID
oleaut32
SafeArrayGetUBound
SysAllocStringByteLen
SysAllocString
VarDateFromStr
VariantInit
SysFreeString
SafeArrayGetVartype
SafeArrayRedim
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetElement
SafeArrayPutElement
SafeArrayAccessData
SafeArrayUnaccessData
SysStringByteLen
VariantCopyInd
VariantCopy
VariantClear
VariantChangeType
SafeArrayGetLBound
SafeArrayCreate
wininet
InternetCrackUrlW
InternetConnectW
InternetOpenUrlW
InternetOpenW
InternetGetLastResponseInfoW
InternetSetFilePointer
InternetCloseHandle
HttpSendRequestExW
InternetSetOptionW
InternetQueryOptionW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetWriteFile
InternetReadFile
HttpQueryInfoW
HttpEndRequestW
shell32
SHGetSpecialFolderPathW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
shlwapi
PathIsUNCW
PathStripToRootW
advapi32
GetUserNameW
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegLoadKeyW
RegSaveKeyW
RegUnLoadKeyW
RegSetValueExW
RegQueryValueExW
RegFlushKey
RegDeleteValueW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegCloseKey
kernel32
CreateSemaphoreW
OpenMutexW
CreateMutexW
CreateEventW
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
TryEnterCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
VirtualQuery
VirtualQueryEx
GetCurrentProcessId
VirtualProtect
VirtualProtectEx
GetProcessVersion
GetProcessTimes
WriteProcessMemory
ReadProcessMemory
ResetEvent
ConnectNamedPipe
WaitForSingleObjectEx
WaitForSingleObject
CreateProcessW
CreateNamedPipeW
SetLastError
QueryDosDeviceW
GetModuleHandleW
ReleaseMutex
FreeLibrary
ExpandEnvironmentStringsW
SetEnvironmentVariableW
GetEnvironmentVariableW
GetSystemDirectoryW
GetComputerNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemInfo
GetVersionExW
WideCharToMultiByte
GetCurrentThread
ExitProcess
GetCurrentProcess
DuplicateHandle
OutputDebugStringA
GetCurrentThreadId
InterlockedCompareExchange
CloseHandle
LoadLibraryW
SetEvent
SizeofResource
LeaveCriticalSection
EnterCriticalSection
GetLastError
TlsGetValue
Sleep
GetProcAddress
ReleaseSemaphore
HeapSize
HeapAlloc
GetStdHandle
FindClose
FindFirstFileW
FindNextFileW
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
HeapFree
LockResource
LoadResource
FormatMessageW
IsDebuggerPresent
OpenProcess
GetLogicalDriveStringsW
GetOverlappedResult
FindResourceW
LocalAlloc
UnhandledExceptionFilter
TerminateProcess
GetTickCount
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LoadLibraryA
InterlockedExchange
LocalFree
TlsAlloc
TlsFree
TlsSetValue
WaitForMultipleObjects
SleepEx
RaiseException
GetExitCodeThread
GetThreadPriority
RtlUnwind
GetCommandLineW
GetWindowsDirectoryW
GetTimeZoneInformation
FileTimeToSystemTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetSystemTimeAsFileTime
RemoveDirectoryW
SetFileTime
DeleteFileW
GetLongPathNameW
CreateFileMappingW
MapViewOfFile
GetFileSize
FlushFileBuffers
SetFilePointer
SetEndOfFile
DeviceIoControl
WriteFile
ReadFile
CreateDirectoryW
GetTempFileNameW
UnmapViewOfFile
SetCurrentDirectoryW
GetCurrentDirectoryW
GetFullPathNameW
GetVolumeInformationW
lstrcpyW
lstrcpynW
CreateFileW
MoveFileW
CopyFileW
GetFileAttributesW
GetTempPathW
MultiByteToWideChar
QueueUserAPC
SuspendThread
ResumeThread
GetThreadTimes
SetThreadContext
GetThreadContext
SetThreadPriority
FreeResource
Exports
Exports
??4CFunTrace@Ext@@QAEAAV01@ABV01@@Z
??4CLocalIgnore@Ext@@QAEAAV01@ABV01@@Z
?read@?$basic_istream@DU?$char_traits@D@ExtSTL@@@ExtSTL@@QAEAAV12@PAC_J@Z
?read@?$basic_istream@DU?$char_traits@D@ExtSTL@@@ExtSTL@@QAEAAV12@PAE_J@Z
?write@?$basic_ostream@DU?$char_traits@D@ExtSTL@@@ExtSTL@@QAEAAV12@PBC_J@Z
?write@?$basic_ostream@DU?$char_traits@D@ExtSTL@@@ExtSTL@@QAEAAV12@PBE_J@Z
API__fstat32
API_strtoi64
API_strtoui64
API_wassert
My_EH_prolog2
My_SEH_epilog
My_SEH_epilog4
My_SEH_prolog
My_SEH_prolog4
My__ehvec_copy_ctor
My_except_handler3
My_except_handler4
_My_CxxThrowException@8
_My__CxxSetUnhandledExceptionFilter@0
__CxxFrameHandler3
_recalloc
_resetstkoflw
_snprintf_s
_snwprintf_s
_stat32
_vsnprintf_s
_vsnwprintf_s
memmove_s
my__report_gsfailure
my_aligned_free
my_aligned_malloc
my_memmove_s
my_recalloc
my_resetstkoflw
my_wcsncpy_s
pcre_callout
pcre_compile
pcre_compile2
pcre_copy_named_substring
pcre_copy_substring
pcre_exec
pcre_free
pcre_free_substring
pcre_free_substring_list
pcre_fullinfo
pcre_get_named_substring
pcre_get_stringnumber
pcre_get_stringtable_entries
pcre_get_substring
pcre_get_substring_list
pcre_malloc
pcre_stack_free
pcre_stack_malloc
wcsncpy_s
Sections
.text Size: 380KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 445KB - Virtual size: 445KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ