SOHDs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d17b389ec64e2f8575e91be3c156cb32_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d17b389ec64e2f8575e91be3c156cb32_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d17b389ec64e2f8575e91be3c156cb32_JaffaCakes118
-
Size
133KB
-
MD5
d17b389ec64e2f8575e91be3c156cb32
-
SHA1
d2c87fa10a2d38126320259fa8ab77863cc2a3b7
-
SHA256
b89145e9b45942c9dde31ab54c357f125a4438af6638bc83c944a18870e99898
-
SHA512
0d3d8c7639d77080dee93c7f1d1d5364bc74e9b1e30a2a42664785c2b259c187671efe48ad1784675c2447d203a4b149fab652476c334055b2d2850e6fe6711c
-
SSDEEP
3072:ldLWaLIEPMsJT97woqEFOkD71JbRpuR+0vU3fGzlLm:ldLWabr1qEFOkT6E083fGzlLm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d17b389ec64e2f8575e91be3c156cb32_JaffaCakes118
Files
-
d17b389ec64e2f8575e91be3c156cb32_JaffaCakes118.exe windows:5 windows x86 arch:x86
a1512e72e137f6717186401b8354a4ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
sohdsdll
??0DeviceSearcher@@QAE@XZ
??1DeviceSearcher@@QAE@XZ
?CheckDeviceConnection@DeviceSearcher@@QAEJPB_W@Z
?PolingDiscovery@DeviceSearcher@@QAEXXZ
?StopSearch@DeviceSearcher@@QAEJXZ
?StartSearch@DeviceSearcher@@QAEJPAV_IDeviceSearcherEvent@@@Z
kernel32
SetEvent
SetLastError
LocalFree
CreateEventW
CreateThread
GetCurrentThreadId
GetModuleHandleW
GetProcAddress
Sleep
WaitForSingleObject
CloseHandle
GetLastError
GetModuleFileNameW
GetCurrentThread
EnterCriticalSection
lstrlenW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
GetCommandLineW
RaiseException
GetCurrentProcessId
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
LeaveCriticalSection
InterlockedCompareExchange
user32
PostThreadMessageW
CharNextW
CharUpperW
TranslateMessage
DispatchMessageW
GetMessageW
MessageBoxW
LoadStringW
advapi32
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
ChangeServiceConfigW
GetSecurityInfo
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
CopySid
IsValidSid
GetLengthSid
ControlService
DeleteService
CreateServiceW
SetServiceStatus
RegisterEventSourceW
ReportEventW
DeregisterEventSource
OpenSCManagerW
OpenServiceW
CloseServiceHandle
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
InitializeSecurityDescriptor
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
MakeAbsoluteSD
GetSecurityDescriptorControl
GetAclInformation
AddAce
InitializeAcl
ole32
CoInitializeEx
CoUninitialize
CoSuspendClassObjects
CoResumeClassObjects
CoCreateInstance
CoDisconnectObject
CoInitializeSecurity
oleaut32
SysStringLen
RegisterTypeLi
SysAllocString
VariantClear
VariantInit
LoadTypeLi
SysFreeString
UnRegisterTypeLi
LoadRegTypeLi
atl90
ord23
ord32
ord58
ord31
ord30
ord64
ord20
ord67
ord49
ord56
ord68
ord17
ord61
msvcr90
_controlfp_s
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
??3@YAXPAX@Z
??_V@YAXPAX@Z
_purecall
free
_CxxThrowException
??_U@YAPAXI@Z
__CxxFrameHandler3
??2@YAPAXI@Z
_recalloc
calloc
memset
malloc
_resetstkoflw
memcpy_s
memmove_s
wcscpy_s
wcsncpy_s
_putws
_vsnwprintf_s
_except_handler4_common
?terminate@@YAXXZ
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
msvcp90
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE