c:\projects\pc connectivity solution\pccs 3.10\source files\platform\platform tools\nclinstaller\nclinstaller\win32\release\NclInstaller.pdb
Behavioral task
behavioral1
Sample
ff906ed909f66794eabc6bfed03329b9_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ff906ed909f66794eabc6bfed03329b9_JaffaCakes118
-
Size
179KB
-
MD5
ff906ed909f66794eabc6bfed03329b9
-
SHA1
76682308fcace4bfce4d8dc7b2c39120d6c6327d
-
SHA256
df838575081633c40bc1d6297cc737f99473d8bb9b9de49311b6ee895a371c1f
-
SHA512
5fe0040e49c58c2419ba17d4d7c5815605dfb5a41dbdfb9a8a7d7a6387d172e42888db1e2210d552936491be570c19480ad7f7f15ed4d3c89c96a9e3823a5ff0
-
SSDEEP
3072:V4xXvG9WpUPZAxt0gTqy2dBQXsyn9/7MPhrMlU32pcMPuIPOT3jSEZ5k:V4VfkAgB7Wj9/71G32uiuIPqFZ2
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff906ed909f66794eabc6bfed03329b9_JaffaCakes118
Files
-
ff906ed909f66794eabc6bfed03329b9_JaffaCakes118.exe windows:4 windows x86 arch:x86
fb854369fb6502c7649553725a2b22de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
newdev
UpdateDriverForPlugAndPlayDevicesW
setupapi
SetupDiCreateDeviceInfoList
SetupDiSetDeviceRegistryPropertyW
SetupDiCreateDeviceInfoW
SetupDiSetClassInstallParamsW
SetupDiSetDeviceInstallParamsW
SetupDiRegisterDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiOpenDevRegKey
SetupDiChangeState
SetupDiGetDeviceInstanceIdW
CM_Get_DevNode_Status
SetupDiGetClassDevsW
SetupDiBuildDriverInfoList
SetupDiSetSelectedDevice
SetupDiGetDeviceInstallParamsW
SetupDiCallClassInstaller
SetupDiGetINFClassW
SetupDiEnumDeviceInfo
SetupDiGetDeviceInfoListDetailW
SetupDiGetSelectedDriverW
SetupDiCreateDevRegKeyW
SetupDiGetDeviceRegistryPropertyW
kernel32
WideCharToMultiByte
FreeLibrary
GetProcAddress
GetSystemDirectoryW
lstrlenW
LoadLibraryW
GetLastError
MultiByteToWideChar
DeleteFileW
FindClose
GetEnvironmentStringsW
SetLastError
FindNextFileW
GetTempPathW
Sleep
GetVersionExW
RemoveDirectoryW
FindFirstFileW
LocalFree
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InitializeCriticalSection
LoadLibraryA
CreateDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WriteFile
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
HeapCreate
GetCurrentThreadId
TlsFree
ExitProcess
VirtualAlloc
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
EnterCriticalSection
advapi32
GetSecurityDescriptorDacl
InitializeAcl
GetSecurityDescriptorControl
GetSecurityDescriptorOwner
GetAce
RegQueryValueExW
GetSecurityDescriptorGroup
GetSecurityDescriptorSacl
LookupAccountNameW
IsValidSid
SetNamedSecurityInfoW
GetLengthSid
AddAce
CopySid
SetSecurityInfo
GetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorLength
GetAclInformation
MakeSelfRelativeSD
RegOpenKeyExW
RegSetValueExW
RegCloseKey
shell32
SHGetFolderPathW
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
VarBstrCat
SysStringLen
SysAllocStringLen
SysAllocStringByteLen
SysStringByteLen
SysAllocString
SysFreeString
shlwapi
PathAppendW
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE