takeown.pdb
Behavioral task
behavioral1
Sample
ee909fc843df8120ee97ea56d2d250da_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ee909fc843df8120ee97ea56d2d250da_JaffaCakes118
-
Size
193KB
-
MD5
ee909fc843df8120ee97ea56d2d250da
-
SHA1
a20e45875eb1bf964afcd15c448ed74fc832d76e
-
SHA256
c33a44b33ffc36360e8ab9b5b9b39b3da8d6dffdb73aeecd7fffbe72f27d2634
-
SHA512
51eba79ab3e5ac0920d532d6db8eda91ba743758d0f4dbef92dac74bd03c73ed51cbf04dfa41e1006dd5048719212b8542d9a08ddc25cf9e1b8935b9b74ea173
-
SSDEEP
6144:E8IOuaxNO0rVScdpHnOfKaFbDdXAA9kr+T:6Ouau0rVSKZnDoWY
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ee909fc843df8120ee97ea56d2d250da_JaffaCakes118
Files
-
ee909fc843df8120ee97ea56d2d250da_JaffaCakes118.exe windows:6 windows x86 arch:x86
06aaa17a234d9e965a577c00e3874cba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
SetFileSecurityW
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
GetSecurityInfo
InitializeSecurityDescriptor
GetTokenInformation
AddAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
GetFileSecurityW
FreeSid
LookupAccountNameW
AllocateAndInitializeSid
CheckTokenMembership
kernel32
CloseHandle
OpenProcess
GetCurrentProcessId
GetLastError
GetComputerNameW
LocalFree
CreateFileW
GetVolumeInformationW
GetVolumePathNameW
FindClose
FindNextFileW
FindFirstFileW
GetCurrentDirectoryW
ReadFile
FlushConsoleInputBuffer
SetConsoleMode
GetConsoleMode
GetStdHandle
GetFileAttributesW
GetFullPathNameW
HeapSetInformation
SetThreadUILanguage
SetLastError
GetComputerNameExW
GetModuleFileNameW
ReadConsoleW
WriteConsoleW
ExitProcess
GetConsoleOutputCP
HeapReAlloc
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
HeapValidate
WideCharToMultiByte
MultiByteToWideChar
CompareStringA
GetThreadLocale
CompareStringW
lstrlenW
lstrlenA
GetFileType
VerSetConditionMask
VerifyVersionInfoW
FormatMessageW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
wcsrchr
wcspbrk
_wcsicmp
memcpy
memset
wcstok
_iob
_vsnwprintf
_memicmp
_get_osfhandle
_errno
_fileno
toupper
fflush
fprintf
__iob_func
wcstod
wcstoul
wcstol
user32
CharUpperW
LoadStringW
mpr
WNetCancelConnection2W
WNetGetLastErrorW
WNetAddConnection2W
secur32
GetUserNameExW
ws2_32
WSACleanup
GetAddrInfoW
WSAGetLastError
FreeAddrInfoW
GetNameInfoW
WSAStartup
shlwapi
StrStrIW
StrChrW
StrStrW
StrChrIW
netapi32
NetApiBufferFree
NetServerGetInfo
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE