D:\VSCORE4\BUILD\VSCore\release\McShield.pdb
Behavioral task
behavioral1
Sample
fb1c038fcdce9b533f1acb454ee151d0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fb1c038fcdce9b533f1acb454ee151d0_JaffaCakes118
-
Size
303KB
-
MD5
fb1c038fcdce9b533f1acb454ee151d0
-
SHA1
0d5aea133478f828f69a19a62f52a3a7e646da5c
-
SHA256
687f9219dbd86ceece6a93ffd46d8f1f30ed4d3203ea53968bd7a1c628b3f827
-
SHA512
4b76a4b2c7fb2f12a4fee4df7b8cdf9428a49ce619aadc3b60b556a0698d7dfb3f4bfac2427794ef365f7a60a2aa1367f76a49cb3cd06c6040a842eabf19086f
-
SSDEEP
6144:qh6HOJnoafWPZQ4J2bVA5XXf8F3DI2Aah5eYPY8keO1+e+xZSC0:M6HDs4J2bVkXXf8F3U2Aah5eoLkvAe6S
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb1c038fcdce9b533f1acb454ee151d0_JaffaCakes118
Files
-
fb1c038fcdce9b533f1acb454ee151d0_JaffaCakes118.exe windows:4 windows x86 arch:x86
efcdbd206207506060217f1a10ca7b23
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
lz32
LZRead
LZOpenFileW
LZClose
rpcrt4
RpcServerListen
RpcServerRegisterIf
RpcServerUseProtseqEpW
NdrServerCall2
lockdown
LockDownProtectService
mytilus3
GetEngine3
mytilus3_server
SetMcShieldEngine
RPC_InitializeServer
mytilus3_worker
CreateUpdateEvents
GetLogger
msvcrt
iswspace
wprintf
towlower
_wcsnicmp
towupper
realloc
_wcslwr
_unlock
__dllonexit
_lock
_onexit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_errno
scanf
strncpy
memmove
swscanf
wcsstr
printf
swprintf
wcschr
sscanf
wcsncat
wcsrchr
_wcsicmp
free
_vsnwprintf
_purecall
wcsncpy
malloc
qsort
_snwprintf
memset
memcpy
wcscat
wcscpy
_wcsdup
iswdigit
__set_app_type
_controlfp
?terminate@@YAXXZ
kernel32
CreateWaitableTimerW
QueryPerformanceCounter
GetModuleHandleA
UnhandledExceptionFilter
RtlUnwind
OutputDebugStringA
DebugBreak
TerminateProcess
SetFilePointer
ReadFile
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
FindFirstFileW
FindNextFileW
FindClose
LoadLibraryA
InterlockedCompareExchange
TryEnterCriticalSection
GetSystemInfo
ResetEvent
ExpandEnvironmentStringsW
SetEnvironmentVariableW
lstrlenW
GetDriveTypeW
ExitThread
InterlockedDecrement
InitializeCriticalSection
CreateMutexW
CreateEventW
SetEvent
DeleteCriticalSection
CloseHandle
LeaveCriticalSection
EnterCriticalSection
Sleep
OutputDebugStringW
WaitForSingleObject
ReleaseMutex
WaitForMultipleObjects
GetTickCount
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedExchange
GetCurrentThreadId
GetLocalTime
IsBadStringPtrW
GetModuleHandleW
CreateThread
PulseEvent
SetProcessWorkingSetSize
GetCurrentProcess
GetLastError
GetShortPathNameW
FreeLibrary
GetProcAddress
LoadLibraryW
OpenEventW
IsBadReadPtr
GetModuleFileNameW
GetVersionExW
GetCurrentProcessId
GetComputerNameW
SetErrorMode
UnmapViewOfFile
LoadLibraryExW
CreateFileW
DeviceIoControl
WideCharToMultiByte
FormatMessageW
ExitProcess
ResumeThread
GetThreadContext
SuspendThread
SetWaitableTimer
SetThreadPriority
DuplicateHandle
GetCurrentThread
GetSystemDirectoryW
CancelWaitableTimer
OpenProcess
SetUnhandledExceptionFilter
SetConsoleCtrlHandler
LocalFree
MapViewOfFile
CreateFileMappingW
user32
MessageBoxW
CharUpperW
PostMessageW
GetSystemMetrics
LoadStringW
RegisterClassW
CreateWindowExW
GetMessageW
DispatchMessageW
GetWindowLongW
SetWindowLongW
DefWindowProcW
wsprintfW
advapi32
OpenThreadToken
GetSidLengthRequired
LookupAccountNameW
ReportEventW
DeregisterEventSource
RegisterEventSourceW
RegQueryInfoKeyW
RegEnumKeyExW
RegNotifyChangeKeyValue
ChangeServiceConfig2W
GetKernelObjectSecurity
GetSecurityDescriptorDacl
GetAclInformation
GetAce
AddAce
SetKernelObjectSecurity
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
CopySid
GetLengthSid
RevertToSelf
GetTokenInformation
DuplicateToken
SetThreadToken
GetUserNameW
InitializeSecurityDescriptor
InitializeAcl
AllocateAndInitializeSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegCreateKeyExW
OpenSCManagerW
ControlService
StartServiceW
OpenServiceW
CloseServiceHandle
RegOpenKeyExW
RegCloseKey
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
RegQueryValueExW
IsValidSid
ole32
CoUninitialize
ntdll
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
NtClose
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bldvar Size: 512B - Virtual size: 18B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE