msdtcexe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f6a51f96557e67dd3a247dfca45ddbf6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6a51f96557e67dd3a247dfca45ddbf6_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
f6a51f96557e67dd3a247dfca45ddbf6_JaffaCakes118
-
Size
295KB
-
MD5
f6a51f96557e67dd3a247dfca45ddbf6
-
SHA1
19fb305c624261144184639a7fd56ecd91fca1e8
-
SHA256
ace72196e4ccbc5658d7613e1475a5205e738c811b37b54278282fd7e21fcf70
-
SHA512
fbf18ac2b8796532a2e4d232bc338d27ab26a8f29235d13be8d253fba0053d58bf627465c0a6d1dbdd1f7ed852d51ce34eddde00d927814a7a398584627806b0
-
SSDEEP
6144:vLTSskwkyXnona1SDczMRvN2o6xgeNvKzQEDp:Dfkyv4OMRvbONXw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6a51f96557e67dd3a247dfca45ddbf6_JaffaCakes118
Files
-
f6a51f96557e67dd3a247dfca45ddbf6_JaffaCakes118.exe windows:6 windows x86 arch:x86
891c448cce61dc42acbb35987026f0d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
UnregisterWait
TlsFree
TlsAlloc
TlsGetValue
LocalAlloc
LocalFree
IsDebuggerPresent
GetCurrentThread
GetThreadContext
DebugBreak
ExpandEnvironmentStringsW
CreateDirectoryW
CreateProcessW
GetExitCodeProcess
FindFirstFileW
FindNextFileW
SetFileAttributesW
DeleteFileW
FindClose
GetModuleHandleW
FindResourceW
LoadResource
LockResource
FormatMessageW
GetModuleFileNameW
LoadLibraryExW
DeleteCriticalSection
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
CreateEventA
CloseHandle
WaitForSingleObjectEx
SetEvent
ResetEvent
FreeLibrary
CreateFileW
GetProcAddress
LoadLibraryA
GetFullPathNameW
GetLastError
QueryFullProcessImageNameW
GetLocalTime
QueueUserWorkItem
OutputDebugStringW
GetSystemWindowsDirectoryA
InitializeCriticalSectionAndSpinCount
ole32
CoGetObjectContext
StringFromGUID2
CoInitializeEx
CoCreateInstance
CoUninitialize
msvcrt
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_CxxThrowException
_onexit
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
??0exception@@QAE@XZ
_wfopen
_purecall
__CxxFrameHandler3
_wstrdate
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
free
_callnewh
malloc
wcschr
_wstrtime
_local_unwind4
_waccess
_vsnwprintf
_wcsicmp
memset
fopen
fclose
fflush
fprintf
fwprintf
wcsrchr
memcpy
??1type_info@@UAE@XZ
msdtctm
ord4
ntdll
RtlCaptureContext
RtlReportException
version
VerQueryValueW
user32
EndDialog
SetDlgItemTextW
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationW
DialogBoxParamW
OpenDesktopW
SetThreadDesktop
GetDesktopWindow
GetWindowRect
GetClientRect
MapWindowPoints
SetWindowPos
LoadStringW
SetProcessWindowStation
advapi32
RegSetValueExW
RegQueryValueExW
OpenProcessToken
GetTokenInformation
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 164KB - Virtual size: 424KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE