AcroRd32Exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d55db78e8a817e981f2722fd39c7f5a4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d55db78e8a817e981f2722fd39c7f5a4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d55db78e8a817e981f2722fd39c7f5a4_JaffaCakes118
-
Size
344KB
-
MD5
d55db78e8a817e981f2722fd39c7f5a4
-
SHA1
484647c503e1aaec1bf79218d2c66943b4b76829
-
SHA256
f6830e1204dc774d8ae9aa50c5aa40166144c281cc7bec4593138010e5e7c63e
-
SHA512
501cbccf1c285d70900f368d83beb4ac40c646d4b202d2d68cc7fc2926226585ba4aaae0ae7cf4a2f9823abe5b4cb6da74d2d4346ad2664092e5b63f09ba7f9d
-
SSDEEP
1536:SvXEgQSr74zn9SRqyO8M9aJfXgY1zUTyr5hVm:SfUNzn9SPO8M+XgTTSjI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d55db78e8a817e981f2722fd39c7f5a4_JaffaCakes118
Files
-
d55db78e8a817e981f2722fd39c7f5a4_JaffaCakes118.exe windows:4 windows x86 arch:x86
d58793df0d5e9b13af2aa028c526ffbd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
UnmapViewOfFile
CreateFileA
VirtualQueryEx
GetCurrentProcess
MapViewOfFile
CreateFileMappingW
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
ReadFile
SetFilePointer
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
GetModuleFileNameA
SizeofResource
LockResource
LoadResource
FindResourceW
GetSystemInfo
MultiByteToWideChar
GetModuleFileNameW
LoadLibraryW
FreeLibrary
GetProcAddress
GetSystemDirectoryW
GetModuleHandleW
WaitForSingleObject
CreateSemaphoreW
ReleaseSemaphore
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetVersionExA
IsDebuggerPresent
OutputDebugStringA
GetVersionExW
HeapSize
GetProcessHeap
GetCurrentThreadId
FindResourceExW
GetCurrentProcessId
GetThreadLocale
GetLocaleInfoA
GetACP
GetSystemTimeAsFileTime
Sleep
InterlockedCompareExchange
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
InterlockedExchange
user32
MessageBoxW
SendMessageW
FindWindowW
UnregisterClassA
advapi32
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
RegOpenKeyW
RegQueryValueExW
RegCloseKey
RegOpenKeyExA
shell32
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
msvcp80
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
msvcr80
??2@YAPAXI@Z
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
??_V@YAXPAX@Z
strchr
strrchr
free
strcpy
malloc
strlen
strcmp
memcpy_s
wcslen
memset
_stricmp
wcsncat_s
wcsncpy_s
wcsrchr
wcscat_s
?terminate@@YAXXZ
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??3@YAXPAX@Z
??0exception@std@@QAE@ABQBDH@Z
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
__CxxFrameHandler3
_snprintf
??1exception@std@@UAE@XZ
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE