c:\mmp_koreasys1\module\setup\atlexe\Release\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
db3736fe9faf7a0934132beae6d09f7c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db3736fe9faf7a0934132beae6d09f7c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db3736fe9faf7a0934132beae6d09f7c_JaffaCakes118
-
Size
46KB
-
MD5
db3736fe9faf7a0934132beae6d09f7c
-
SHA1
0a3ce43b1b89dda7ca56331007b1aa424d0f4bdf
-
SHA256
6bbc368f75aec0e2a78233c99fbb5ef681c12ebe205eee58ebf32b6f5fd21566
-
SHA512
9fd889e8ab155aa5437058483fe308df78d2b5d16abbe1f2814e58d99b133e7806f04b0c42d9fcf6f1c8ce7fc5434d42bd751ea6c7708602f7adb81aa3c30378
-
SSDEEP
768:tIlyCPLePoBjCC/lZLvwOBw23MR3Cxm1zSXV0OxWPat:ell7B+AlpwkpMxy2SXuOxWO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db3736fe9faf7a0934132beae6d09f7c_JaffaCakes118
Files
-
db3736fe9faf7a0934132beae6d09f7c_JaffaCakes118.exe windows:5 windows x86 arch:x86
417855a8c78a70a2772f702e74f8eb4e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
lstrcatA
lstrcpyA
SetLastError
GetLastError
CreateRemoteThread
GetProcAddress
GetExitCodeProcess
DuplicateHandle
GetCurrentProcess
GetModuleHandleA
ExpandEnvironmentStringsA
MoveFileA
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
GetTempPathA
GetCommandLineA
GetModuleFileNameA
GetLocalTime
GetTickCount
GetSystemTimeAsFileTime
GetCurrentProcessId
GetFileAttributesExA
CreateThread
WaitForSingleObject
TerminateThread
CloseHandle
WriteFile
CreateMutexA
Sleep
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
user32
wsprintfA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyA
shell32
ShellExecuteA
ole32
CoInitialize
oleaut32
SysFreeString
shlwapi
PathGetArgsA
PathFileExistsA
PathIsDirectoryA
PathRemoveBlanksA
PathFindFileNameA
msvcp90
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
ws2_32
send
__WSAFDIsSet
recv
connect
ioctlsocket
htons
select
closesocket
socket
gethostbyname
WSAStartup
netapi32
Netbios
msvcr90
_except_handler4_common
_invoke_watson
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
_stricmp
exit
??3@YAXPAX@Z
__CxxFrameHandler3
memcpy
vsprintf
fclose
fwrite
fopen
sprintf
atoi
strncpy
strstr
memset
isalpha
tolower
rand
strtok
srand
_invalid_parameter_noinfo
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
??2@YAPAXI@Z
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??_V@YAXPAX@Z
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ