msdt.pdb
Behavioral task
behavioral1
Sample
eaf5b6381fb932a9f6c9e46b1b194ce9_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eaf5b6381fb932a9f6c9e46b1b194ce9_JaffaCakes118
-
Size
266KB
-
MD5
eaf5b6381fb932a9f6c9e46b1b194ce9
-
SHA1
c24847613ca98992f9e86c0e5cf5296efbb9174a
-
SHA256
cf373bfcd39b48811b76f195c203c0bb8b40059afa63b50739f29723b95cce9e
-
SHA512
f20c6b29f84d5204906973b1c418a740793793a192127a2726ea1230b457529000d2438ed3a0cf65ab13529fc7c589ebb35313f3226dd51067d55f664bcbddd4
-
SSDEEP
6144:t8NRywewZDlwVKff+FlB5FFg8X8yfK4mWOfHlsO:t8ezwZDlwYiLFg8X8ypRO
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eaf5b6381fb932a9f6c9e46b1b194ce9_JaffaCakes118
Files
-
eaf5b6381fb932a9f6c9e46b1b194ce9_JaffaCakes118.exe windows:6 windows x86 arch:x86
f79e6078fa2746cba3dd70a7281a7c14
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
EventActivityIdControl
CloseServiceHandle
QueryServiceStatus
StartServiceW
OpenServiceW
OpenSCManagerW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
EventUnregister
EventWrite
EventEnabled
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
EventRegister
kernel32
GetExitCodeProcess
WaitForSingleObject
GetTickCount
FindClose
FindNextFileW
FindFirstFileW
lstrcmpW
QueryPerformanceFrequency
Sleep
GetThreadLocale
GetUserDefaultLCID
GetFileMUIPath
GetModuleFileNameW
DeleteFileW
GetProductInfo
SetLastError
LocalFree
FormatMessageW
OpenProcess
QueryFullProcessImageNameW
GetCurrentProcess
GetCurrentDirectoryW
QueryPerformanceCounter
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateDirectoryW
SetCurrentDirectoryW
GetProcessId
GetEnvironmentVariableW
GetFileAttributesExW
CreateFileW
HeapSetInformation
CloseHandle
SetFileAttributesW
RemoveDirectoryW
WriteFile
GetProcessTimes
lstrcmpiW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetComputerNameW
OutputDebugStringA
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
RaiseException
CompareStringW
InterlockedDecrement
ExpandEnvironmentStringsW
GetLastError
GetFullPathNameW
user32
SetFocus
LoadStringW
GetScrollBarInfo
UnregisterClassA
SetWindowLongW
ShutdownBlockReasonCreate
ShutdownBlockReasonDestroy
GetParent
GetDlgItem
PostMessageW
SendMessageW
SetDlgItemTextW
KillTimer
GetWindowThreadProcessId
ShowWindow
SetWindowPos
EnumWindows
SetTimer
CheckDlgButton
IsDlgButtonChecked
GetWindowTextLengthW
GetDlgItemTextW
SetWindowTextW
UpdateWindow
ShowScrollBar
MessageBoxW
GetWindowLongW
EnableWindow
EndDialog
DialogBoxParamW
SetForegroundWindow
FindWindowExW
FindWindowW
IsWindowVisible
msvcrt
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__p__fmode
_callnewh
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@XZ
_CxxThrowException
iswspace
_wcsdup
_wcsicmp
calloc
realloc
_purecall
_vsnwprintf
memset
_wtoi
_wtol
wcschr
wcscspn
__CxxFrameHandler3
malloc
free
__set_app_type
??1type_info@@UAE@XZ
_errno
_unlock
__dllonexit
_lock
??0exception@@QAE@ABQBD@Z
memcpy_s
memmove_s
_wcslwr_s
wcsncmp
wcstol
iswdigit
_wcslwr
wcsrchr
wcsftime
localtime
time
_onexit
?terminate@@YAXXZ
_except_handler4_common
_controlfp
__wgetmainargs
_wcsnicmp
comctl32
CreatePropertySheetPageW
InitCommonControlsEx
PropertySheetW
ord345
shlwapi
UrlEscapeW
ord559
UrlGetPartW
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitializeEx
wdi
WdiCreateInstance
WdiGetInstanceId
WdiDiagnose
WdiGetProgress
WdiCancel
WdiCloseInstance
WdiGetParameterDataLength
WdiGetParameterData
WdiGetParameterByIndex
WdiGetParameterName
WdiResolve
WdiGetParameterCount
WdiAddParameter
WdiGetResult
WdiGetInstanceFilePath
WdiGetParameterByName
ntdll
WinSqmAddToStream
WinSqmEventEnabled
WinSqmEndSession
WinSqmStartSession
WinSqmEventWrite
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
oleaut32
VariantChangeType
SysFreeString
SysAllocString
VariantInit
VariantClear
SysAllocStringLen
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
CommandLineToArgvW
ord190
SHCreateShellItem
ord155
ShellExecuteExW
ShellExecuteW
comdlg32
GetOpenFileNameW
GetSaveFileNameW
rstrtmgr
RmEndSession
RmStartSession
RmRegisterResources
RmShutdown
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE