d:\build\V1.5\Output\Release(x86)\Program Files\Common Files\ConnectionManager.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fcea061908ba868f3219c5114d898bc3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcea061908ba868f3219c5114d898bc3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fcea061908ba868f3219c5114d898bc3_JaffaCakes118
-
Size
231KB
-
MD5
fcea061908ba868f3219c5114d898bc3
-
SHA1
d4b13fb0f0a068230fe23af86097e61e90e88002
-
SHA256
fc6573a7ca8a1b96846b2e92c3b8dbb8e9aeeac808f614769580474861a87c31
-
SHA512
abd444e143eb0ff8b544c25d274bb0e9a9cb6c90c34aa6de8f766295ef1bfebd7bfd8c17261adc7295daa3977a280856f215b8d25c22cf39f07f25d9d21e7628
-
SSDEEP
6144:cyAkmgdYRcSuI7bOIN/CWOlZcP2UmgUc3:c/5gdYK3g6WAceUXU4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fcea061908ba868f3219c5114d898bc3_JaffaCakes118
Files
-
fcea061908ba868f3219c5114d898bc3_JaffaCakes118.exe windows:5 windows x86 arch:x86
4ff8471916cd07e38bb3091cb5812f0b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
deviceservicecbt
?NPSCBT_Open@@YAJPAEW4BTSERVICETYPE@@PA_W@Z
?NPSCBT_Init@@YAJXZ
?NPSCBT_GetStackType@@YA?AW4BTSTACKTYPE@@XZ
?NPSCBT_Search_Stop@@YAJXZ
?NPSCBT_Deinit@@YAJXZ
ws2_32
getsockopt
setsockopt
connect
WSACreateEvent
WSAEventSelect
recv
send
WSAEnumNetworkEvents
WSAWaitForMultipleEvents
shutdown
WSAGetLastError
closesocket
socket
WSAStartup
WSACloseEvent
htons
WSACleanup
WSAIoctl
inet_addr
kernel32
SetEvent
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
ReleaseMutex
GetCurrentProcessId
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
WaitForMultipleObjects
OpenProcess
CreateThread
WaitForSingleObject
lstrlenW
GetModuleFileNameW
Sleep
GetLastError
CreateMutexW
MultiByteToWideChar
LocalFree
LocalAlloc
FormatMessageW
TerminateProcess
ResumeThread
AssignProcessToJobObject
CreateProcessW
SetInformationJobObject
CreateJobObjectW
DeviceIoControl
CreateFileW
GetDriveTypeW
WideCharToMultiByte
GetTickCount
GetVersionExW
OutputDebugStringW
GetCurrentProcess
GetProcAddress
GetModuleHandleW
FreeLibrary
WriteFile
QueryPerformanceCounter
QueryPerformanceFrequency
GetCommandLineW
PurgeComm
EscapeCommFunction
SetCommMask
ClearCommError
GetOverlappedResult
ReadFile
WaitCommEvent
SetCommTimeouts
SetCommState
GetCommState
SetupComm
GetCommModemStatus
RaiseException
OutputDebugStringA
HeapFree
GetProcessHeap
OpenEventA
CreateEventA
ExitThread
LoadLibraryA
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
CloseHandle
DeleteCriticalSection
EnterCriticalSection
ResetEvent
LeaveCriticalSection
CreateEventW
InitializeCriticalSection
HeapSize
HeapReAlloc
HeapAlloc
HeapDestroy
user32
RegisterWindowMessageW
TranslateMessage
DispatchMessageW
PostMessageW
PostThreadMessageW
CharNextW
CharUpperW
GetMessageW
advapi32
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegCreateKeyW
RegOpenKeyW
RegQueryValueExA
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
ord165
ole32
CoTaskMemFree
StringFromCLSID
CoInitializeEx
CoUninitialize
CoSuspendClassObjects
CoResumeClassObjects
CoInitialize
CoCreateInstance
oleaut32
GetErrorInfo
RegisterTypeLi
UnRegisterTypeLi
VARIANT_UserSize
VARIANT_UserMarshal
VARIANT_UserUnmarshal
VARIANT_UserFree
BSTR_UserSize
BSTR_UserMarshal
BSTR_UserUnmarshal
BSTR_UserFree
LPSAFEARRAY_UserSize
LPSAFEARRAY_UserMarshal
LPSAFEARRAY_UserUnmarshal
LPSAFEARRAY_UserFree
SafeArrayCreate
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocString
SafeArrayUnlock
SafeArrayLock
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
SafeArrayCopy
VariantClear
VariantInit
SafeArrayGetVartype
LoadTypeLi
LoadRegTypeLi
SysStringLen
SysAllocStringLen
SysFreeString
SafeArrayCreateVector
atl90
ord64
ord20
ord17
ord10
ord68
ord31
ord58
ord32
ord61
ord23
ord11
ord56
ord49
ord67
setupapi
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiGetDeviceInstanceIdW
SetupDiDestroyDeviceInfoList
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcr90
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
wcsncpy_s
wcscat_s
vsprintf_s
_vscprintf
_vsnwprintf_s
swscanf_s
wcscspn
wcsspn
memset
wcsnlen
_wtoi
_initterm_e
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_wcsupr_s
wcschr
wcsstr
_wcsicmp
free
vswprintf_s
_vscwprintf
memmove_s
memcpy_s
memcpy
??_V@YAXPAX@Z
??2@YAPAXI@Z
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
_invalid_parameter_noinfo
__CxxFrameHandler3
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
??3@YAXPAX@Z
_crt_debugger_hook
_invoke_watson
swprintf_s
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
_except_handler4_common
sprintf_s
_vsnprintf_s
strnlen
_controlfp_s
malloc
rpcrt4
NdrStubForwardingFunction
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrCStdStubBuffer2_Release
NdrOleAllocate
NdrOleFree
NdrStubCall2
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 512B - Virtual size: 266B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ