c:\BuildServer\bs1\work\WoW-code\branches\wow-patch-3_2_2_A-branch\WoW\Bin\WowError.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d5ee635864db8d63b181f1420de007ba_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5ee635864db8d63b181f1420de007ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5ee635864db8d63b181f1420de007ba_JaffaCakes118
-
Size
390KB
-
MD5
d5ee635864db8d63b181f1420de007ba
-
SHA1
362d0bb6514622d27ebac2a16c2e3d0a6cda0732
-
SHA256
02f85e52f980752e4e87f08edf38bce3a326a4b7510f4d15e32bdee963355bbe
-
SHA512
2259e4083affe2bfa41b99159e91833d740cf87a70b51260a1e8735358831a46e8964131b1398cead4f6989ef53bc984faca8cc2f87f774e9899e9e71ae1bd73
-
SSDEEP
12288:AC6NHNTTLZw23Bp4Gxf3gA3xBjQTrzs79Vhz:AC6NHNTZwy3gA3jsTrzs79H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5ee635864db8d63b181f1420de007ba_JaffaCakes118
Files
-
d5ee635864db8d63b181f1420de007ba_JaffaCakes118.exe windows:4 windows x86 arch:x86
ed76e2ffa83301a747deead15d1d8eb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wsock32
WSAStartup
socket
inet_ntoa
htons
connect
gethostbyname
select
__WSAFDIsSet
getsockopt
send
WSAGetLastError
closesocket
kernel32
Sleep
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
CloseHandle
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
ReadFile
RtlUnwind
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetVersionExA
LoadLibraryA
InitializeCriticalSection
GetModuleHandleA
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CreateFileA
LCMapStringA
LCMapStringW
GetTimeZoneInformation
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
CompareStringA
CompareStringW
RemoveDirectoryA
DuplicateHandle
CreateEventA
DeleteFileA
MoveFileA
GetFileAttributesExA
QueryPerformanceFrequency
SystemTimeToFileTime
SignalObjectAndWait
SetThreadPriority
GetProcAddress
GetSystemInfo
GetNativeSystemInfo
GetCPInfo
GlobalMemoryStatusEx
GetLastError
FormatMessageA
LocalFree
FindNextFileA
GetDiskFreeSpaceExA
GetShortPathNameA
FreeLibrary
SetEnvironmentVariableA
SetEvent
CreateThread
WaitForSingleObject
IsBadWritePtr
OpenThread
ExitThread
RaiseException
SetFileTime
SetFileAttributesA
GetFileAttributesA
CreateDirectoryA
GetLocalTime
GetExitCodeProcess
GetVersion
OutputDebugStringA
GetFileSize
IsBadReadPtr
GetComputerNameA
VirtualQuery
lstrcpynA
Thread32Next
Thread32First
CreateToolhelp32Snapshot
ResumeThread
GetThreadContext
SuspendThread
user32
MsgWaitForMultipleObjects
LoadAcceleratorsA
PeekMessageA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadIconA
LoadCursorA
RegisterClassExA
MoveWindow
BeginPaint
EndPaint
DefWindowProcA
DialogBoxParamA
DestroyWindow
CreateWindowExA
GetWindowRect
GetClientRect
ShowWindow
UpdateWindow
GetDlgItemTextA
SendMessageA
LoadStringA
EnableWindow
EndDialog
MessageBoxA
IsWindow
PostQuitMessage
IsWindowVisible
gdi32
SetTextColor
SetBkColor
GetStockObject
CreateSolidBrush
advapi32
RegCloseKey
RegOpenKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetUserNameA
RegQueryValueExW
RegOpenKeyExW
RegQueryValueExA
Sections
.text Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rrdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE