C:\exe.pdb
Behavioral task
behavioral1
Sample
eb18c10daec2052a035420c3866ca62f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb18c10daec2052a035420c3866ca62f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb18c10daec2052a035420c3866ca62f_JaffaCakes118
-
Size
318KB
-
MD5
eb18c10daec2052a035420c3866ca62f
-
SHA1
4b3cee088f397e4d9f774c5c4a4f3c81d1a221d8
-
SHA256
dfc157b611233ffb1037d4af638866e89f1d5504b10f86827de79a42cd4fa1ae
-
SHA512
bf4202edc0f28ba4fe52e741aea6e6e96f2240e39a74d097ff9df349a37113e2b52b51d1d0eb463a413442b78086651c3f67d9450f2983223f2712200246c1a5
-
SSDEEP
6144:I1zSIqrkISRfXfpY+0yFdADAc74eJpTWCy2vd/BuiRoG:/4ISRPfu+TmZ77Rku1Buyo
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb18c10daec2052a035420c3866ca62f_JaffaCakes118
Files
-
eb18c10daec2052a035420c3866ca62f_JaffaCakes118.exe windows:5 windows x86 arch:x86
3afa8d287f3c59386a4a5bc5f6b52ae9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
atoi
wcsrchr
strrchr
srand
rand
strstr
strlen
??2@YAPAXI@Z
??3@YAXPAX@Z
memset
memcpy
_except_handler3
shlwapi
PathFileExistsA
SHGetValueA
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
ws2_32
WSAEventSelect
shutdown
connect
WSAStartup
htonl
htons
setsockopt
sendto
WSACleanup
inet_addr
closesocket
send
WSACreateEvent
bind
WSARecvFrom
WSAGetLastError
inet_ntoa
gethostname
socket
WSAResetEvent
gethostbyname
iphlpapi
GetAdaptersInfo
wintrust
WinVerifyTrust
mpr
WNetOpenEnumA
WNetEnumResourceA
WNetAddConnection2A
WNetCancelConnection2A
kernel32
GlobalFree
GetLocalTime
TerminateProcess
GlobalAlloc
GetLogicalDrives
GetFileAttributesA
CreateDirectoryA
TransactNamedPipe
MoveFileExA
RemoveDirectoryA
GetExitCodeThread
FlushViewOfFile
SetFileAttributesA
FindNextFileA
WaitForMultipleObjects
ExitProcess
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
VirtualQuery
SetEndOfFile
FreeLibrary
WaitForSingleObject
SetEvent
VirtualFree
WriteFile
OpenProcess
Sleep
CreateEventA
ReadFile
GetSystemDirectoryA
ExitThread
MultiByteToWideChar
GetLastError
lstrcmpiA
GetProcAddress
VirtualAlloc
LoadLibraryA
OpenEventA
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
GetTempPathA
DeleteFileA
FindResourceA
FreeResource
LoadResource
Process32First
GetSystemTimeAsFileTime
SetFileTime
GetDriveTypeA
SizeofResource
GetExitCodeProcess
CreateProcessA
lstrcatA
Process32Next
LockResource
DeviceIoControl
FindClose
LoadLibraryExA
CreateToolhelp32Snapshot
GetFileTime
GetVersionExA
LocalFree
lstrcpyA
ConnectNamedPipe
TerminateThread
Thread32Next
DisconnectNamedPipe
FlushFileBuffers
CreateNamedPipeA
OpenThread
GetCurrentProcess
GetVolumeInformationA
lstrlenW
lstrcmpiW
VirtualProtect
lstrcpyW
CreateThread
GetTickCount
MapViewOfFile
UnmapViewOfFile
CopyFileA
CreateFileMappingA
WinExec
lstrcpynA
FindFirstFileA
GetLogicalDriveStringsA
SetNamedPipeHandleState
user32
OpenDesktopA
OpenWindowStationA
FindWindowA
SetThreadDesktop
UnloadKeyboardLayout
GetMessageA
PostThreadMessageA
wsprintfA
wsprintfW
GetInputState
PostMessageA
SetProcessWindowStation
LoadKeyboardLayoutA
advapi32
OpenServiceA
OpenProcessToken
GetTokenInformation
RegSetValueExA
RegQueryValueExA
CreateServiceA
StartServiceA
RegCreateKeyExA
RegOpenKeyExA
QueryServiceStatus
RegDeleteValueA
OpenSCManagerA
DuplicateTokenEx
CreateProcessAsUserA
RegSetValueExW
AdjustTokenPrivileges
RegFlushKey
RegSaveKeyA
LookupPrivilegeValueA
RegQueryValueExW
RegRestoreKeyA
DeleteService
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
SetEntriesInAclA
RegCloseKey
RegOpenKeyA
ControlService
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE