msdtcexe.pdb
Behavioral task
behavioral1
Sample
fb3f9175ad64fbccc6ae2bebd60e530e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fb3f9175ad64fbccc6ae2bebd60e530e_JaffaCakes118
-
Size
275KB
-
MD5
fb3f9175ad64fbccc6ae2bebd60e530e
-
SHA1
f1fc294032ee7d27cfc97ff03946f78ccc5b6cdd
-
SHA256
bc5a2b126fafb10130f7ac0acfb8d3a877a046899e1cecb98d5a83c4dc703b42
-
SHA512
b254c658b6cc7b3a5168f99b6264876f6ae52d1a19279633906d472e19b7e4039b695d24170ec3835a65aea40cf73892fbdd5cc52bf68ceedc1870f696f4c93c
-
SSDEEP
3072:nYEFxMwSsk2v7fcmEAkyXiqjo7isGXuc8VdoS649KgjVax9Hi7wZVGrY8lDaTgj:hLTSskwkyXn87iWtj623ai4VGrY8ZH
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb3f9175ad64fbccc6ae2bebd60e530e_JaffaCakes118
Files
-
fb3f9175ad64fbccc6ae2bebd60e530e_JaffaCakes118.exe windows:6 windows x86 arch:x86
891c448cce61dc42acbb35987026f0d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
UnregisterWait
TlsFree
TlsAlloc
TlsGetValue
LocalAlloc
LocalFree
IsDebuggerPresent
GetCurrentThread
GetThreadContext
DebugBreak
ExpandEnvironmentStringsW
CreateDirectoryW
CreateProcessW
GetExitCodeProcess
FindFirstFileW
FindNextFileW
SetFileAttributesW
DeleteFileW
FindClose
GetModuleHandleW
FindResourceW
LoadResource
LockResource
FormatMessageW
GetModuleFileNameW
LoadLibraryExW
DeleteCriticalSection
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
CreateEventA
CloseHandle
WaitForSingleObjectEx
SetEvent
ResetEvent
FreeLibrary
CreateFileW
GetProcAddress
LoadLibraryA
GetFullPathNameW
GetLastError
QueryFullProcessImageNameW
GetLocalTime
QueueUserWorkItem
OutputDebugStringW
GetSystemWindowsDirectoryA
InitializeCriticalSectionAndSpinCount
ole32
CoGetObjectContext
StringFromGUID2
CoInitializeEx
CoCreateInstance
CoUninitialize
msvcrt
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_CxxThrowException
_onexit
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
??0exception@@QAE@XZ
_wfopen
_purecall
__CxxFrameHandler3
_wstrdate
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
free
_callnewh
malloc
wcschr
_wstrtime
_local_unwind4
_waccess
_vsnwprintf
_wcsicmp
memset
fopen
fclose
fflush
fprintf
fwprintf
wcsrchr
memcpy
??1type_info@@UAE@XZ
msdtctm
ord4
ntdll
RtlCaptureContext
RtlReportException
version
VerQueryValueW
user32
EndDialog
SetDlgItemTextW
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationW
DialogBoxParamW
OpenDesktopW
SetThreadDesktop
GetDesktopWindow
GetWindowRect
GetClientRect
MapWindowPoints
SetWindowPos
LoadStringW
SetProcessWindowStation
advapi32
RegSetValueExW
RegQueryValueExW
OpenProcessToken
GetTokenInformation
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE