rdshost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e04675de534733eb584a1133b9599cd6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e04675de534733eb584a1133b9599cd6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e04675de534733eb584a1133b9599cd6_JaffaCakes118
-
Size
82KB
-
MD5
e04675de534733eb584a1133b9599cd6
-
SHA1
09069e1b1cb9012ab6a5d836e319ae7fd3f002d8
-
SHA256
0f4a2253bbe6aaeed7f1c77271df52a4431cdfc049fe329279edd21b8e9f9af2
-
SHA512
d2b31bda31c524b799d3da970d9fa6d2cee680b8adc01b00f1af1a4ace6895ea60018a19a96189654d68a1a51a1902720a4aff17aaa0e1adcc37153226e7d768
-
SSDEEP
1536:fflcQMy5YI1G4tduxsda+YfKliGGKSuGezC3jCpi0ztfoka:nlcYYDIuxsxY6iGZSDR3jWRz6ka
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e04675de534733eb584a1133b9599cd6_JaffaCakes118
Files
-
e04675de534733eb584a1133b9599cd6_JaffaCakes118.exe windows:5 windows x86 arch:x86
0ea6889cceb05f6e6c36cf5a3bed4897
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_c_exit
_exit
_XcptFilter
_cexit
exit
wcscmp
__wgetmainargs
_controlfp
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__CxxFrameHandler
_CxxThrowException
??2@YAPAXI@Z
realloc
free
malloc
_purecall
_wcmdln
wcslen
wcstok
_wtoi
_wtol
wcschr
_initterm
??3@YAXPAX@Z
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
advapi32
FreeSid
LookupAccountNameW
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
OpenThreadToken
EqualSid
AllocateAndInitializeSid
OpenProcessToken
RegEnumKeyExW
GetTokenInformation
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSid
GetLengthSid
CopySid
InitializeSecurityDescriptor
RegEnumValueW
RegQueryInfoKeyW
ConvertSidToStringSidW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
kernel32
WriteFile
ReadFile
SetLastError
CreateNamedPipeW
LocalFree
WideCharToMultiByte
GetACP
LocalAlloc
ProcessIdToSessionId
GetCurrentProcessId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoW
ConnectNamedPipe
EnterCriticalSection
MultiByteToWideChar
lstrlenW
lstrcpyW
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
SetEvent
CloseHandle
WaitForSingleObject
lstrcmpiW
lstrcpynW
HeapDestroy
lstrcatW
GetModuleFileNameW
GetLastError
CreateThread
CreateEventW
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
GetCurrentThread
lstrlenA
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetShortPathNameW
Sleep
GetCurrentThreadId
GetCommandLineW
LeaveCriticalSection
GetOverlappedResult
DisconnectNamedPipe
ResetEvent
FlushFileBuffers
user32
PostThreadMessageW
DispatchMessageW
GetMessageW
wsprintfW
CharNextW
winsta
WinStationConnectCallback
ole32
CoImpersonateClient
CoRevertToSelf
CoSetProxyBlanket
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
oleaut32
SysFreeString
SysAllocString
VarUI4FromStr
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
SysStringLen
SysAllocStringLen
VariantClear
SysAllocStringByteLen
SysStringByteLen
wsock32
htons
ioctlsocket
gethostbyname
WSAStartup
WSACleanup
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE