D:\rc_v11_i18n_20200915_branch\Build\Release\WPSOffice\office6\KPacket.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eac7a15fa8096f6c678bba2dd3ee584c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eac7a15fa8096f6c678bba2dd3ee584c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac7a15fa8096f6c678bba2dd3ee584c_JaffaCakes118
-
Size
3.2MB
-
MD5
eac7a15fa8096f6c678bba2dd3ee584c
-
SHA1
d1db26680cf0e678acd1909bb860cc2f16b2255c
-
SHA256
621202764da6d4b8fd9ae8dd15a0204dfec5d8941b42e86c3ee3aac01df90cd8
-
SHA512
e203d46cf7c4af673e6003b97079408ea95c70c3c6176f2ac4059513de91680570bb6677350a57840da30723d6a277068c9c7a7c6161f9c7b094b9cbdecfa1bd
-
SSDEEP
49152:u8fIo2ysJlvGtOXyspW1CGAzihxtTlJj4ORRrZ0s5PKYTKUbge2mv/8C:hIo2yIGIXyRxhl144rFVge2mv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eac7a15fa8096f6c678bba2dd3ee584c_JaffaCakes118
Files
-
eac7a15fa8096f6c678bba2dd3ee584c_JaffaCakes118.exe windows:5 windows x86 arch:x86
322f27794260fc307bd3094fbbddf68a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualAlloc
VirtualFree
GetVersionExW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetLastError
CloseHandle
WaitForSingleObject
CreateEventW
SetEvent
ResetEvent
CreateSemaphoreW
ReleaseSemaphore
InitializeCriticalSection
CreateFileW
FindClose
FindFirstFileW
GetFileAttributesW
FindNextFileW
lstrlenW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetFileSize
SetFilePointer
SetEndOfFile
SetFilePointerEx
WriteFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetSystemDirectoryW
CopyFileW
MoveFileExW
DeleteFileW
GetTickCount
CreateDirectoryW
ReadFile
GetStdHandle
WaitForMultipleObjects
MultiByteToWideChar
WideCharToMultiByte
SetFileAttributesW
RemoveDirectoryW
MoveFileW
GetWindowsDirectoryW
GetFullPathNameW
GetCurrentDirectoryW
GetTempPathW
GetTempFileNameW
GetSystemInfo
GetProcAddress
GetModuleHandleW
GetCurrentProcess
GetCurrentThread
SetLastError
InterlockedDecrement
LocalFree
GetSystemWow64DirectoryW
LoadLibraryW
GetDateFormatW
GetTimeFormatW
GetVersion
GetModuleHandleA
Process32NextW
Process32FirstW
GetCurrentProcessId
CreateToolhelp32Snapshot
ReadProcessMemory
OpenProcess
GetPrivateProfileStringW
FreeLibrary
LoadLibraryExW
QueryPerformanceCounter
QueryPerformanceFrequency
OpenMutexW
CreateMutexW
CreateProcessW
GetExitCodeProcess
Sleep
ExpandEnvironmentStringsW
GetFileAttributesExW
TerminateProcess
GetDiskFreeSpaceExW
lstrcmpW
GetPrivateProfileIntW
WritePrivateProfileStringW
SetCurrentDirectoryW
GetPrivateProfileSectionNamesW
GetPrivateProfileSectionW
lstrlenA
CreateFileA
RaiseException
FlushInstructionCache
OpenEventW
GetCurrentThreadId
FreeResource
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleFileNameW
GetCommandLineW
LocalAlloc
SetPriorityClass
SetErrorMode
OutputDebugStringW
GetLongPathNameW
QueryDosDeviceW
ProcessIdToSessionId
GetLocalTime
CreateThread
IsWow64Process
HeapFree
GetProcessHeap
HeapAlloc
GetNativeSystemInfo
GetLocaleInfoW
GetUserDefaultLangID
ReleaseMutex
InitializeCriticalSectionAndSpinCount
MapViewOfFileEx
InterlockedIncrement
lstrcmpiW
TerminateThread
InterlockedExchange
MulDiv
GetFileSizeEx
InterlockedPopEntrySList
LoadLibraryA
InterlockedCompareExchange
DeviceIoControl
InterlockedExchangeAdd
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleHandleExW
GetSystemTime
GetCompressedFileSizeW
FlushViewOfFile
OutputDebugStringA
WaitForSingleObjectEx
UnlockFileEx
UnlockFile
SystemTimeToFileTime
LockFileEx
LockFile
HeapCompact
HeapValidate
HeapSize
HeapReAlloc
HeapDestroy
HeapCreate
GetVersionExA
GetTempPathA
GetSystemTimeAsFileTime
GetFullPathNameA
GetFileAttributesA
GetDiskFreeSpaceW
GetDiskFreeSpaceA
FormatMessageW
FormatMessageA
FlushFileBuffers
DeleteFileA
CreateFileMappingA
AreFileApisANSI
TryEnterCriticalSection
HeapSetInformation
GetStartupInfoW
ExitThread
DecodePointer
EncodePointer
RtlUnwind
VirtualProtect
VirtualQuery
ExitProcess
GetTimeFormatA
GetDateFormatA
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetConsoleCP
GetConsoleMode
GetStringTypeW
GetTimeZoneInformation
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
InterlockedPushEntrySList
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 540KB - Virtual size: 539KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ