C:\BUILD_AREA\jdk6\control\build\windows-i586\tmp\deploy\javaws\bin\javaws.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ffed5844ab84c214dd019cd9cd7e6748_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ffed5844ab84c214dd019cd9cd7e6748_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ffed5844ab84c214dd019cd9cd7e6748_JaffaCakes118
-
Size
142KB
-
MD5
ffed5844ab84c214dd019cd9cd7e6748
-
SHA1
9c2f976f5a52e2f5cf02c738a5d26f3c8279e6f4
-
SHA256
0610942044a85121d4f5f394b48f59a6c37a64c4ed13f48e73d7a2c319edab86
-
SHA512
1f555c4b73a37fa432e7cd7d0e3d97f9dfaf9d3fdf76b8da1d2cc1beb704968885a82e5ac8fbdbb33a4d74762bc269f25e4bbbed37f9a6b7a77f02158e35ef3f
-
SSDEEP
3072:Z4elsUeaEXW6BQZv6NSgapKbDsnplerDRBjZqMNqZ:ZpyrZdBQZvGakbHxvq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ffed5844ab84c214dd019cd9cd7e6748_JaffaCakes118
Files
-
ffed5844ab84c214dd019cd9cd7e6748_JaffaCakes118.exe windows:4 windows x86 arch:x86
3bd3c8ab805e675e9ee8d991d6c37b33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetThreadLocale
WideCharToMultiByte
GlobalAlloc
MultiByteToWideChar
ReadFile
CloseHandle
WaitForSingleObject
CreateProcessA
SetHandleInformation
CreatePipe
CreateDirectoryA
GetWindowsDirectoryA
FindClose
GetModuleFileNameA
GetModuleHandleA
GetVersionExA
SetEnvironmentVariableW
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetTickCount
LoadLibraryA
GetProcAddress
FindFirstFileA
FreeLibrary
GetCurrentProcessId
QueryPerformanceCounter
GetTimeZoneInformation
FlushFileBuffers
HeapSize
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemInfo
VirtualProtect
InitializeCriticalSection
GetOEMCP
GetACP
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetLastError
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
GetFileType
CreateFileA
GetStartupInfoA
GetCommandLineA
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetStringTypeA
GetStringTypeW
WriteFile
SetStdHandle
SetHandleCount
GetStdHandle
GetFileAttributesA
SetEndOfFile
SetFilePointer
RtlUnwind
InterlockedExchange
VirtualQuery
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetLocaleInfoA
GetExitCodeProcess
user32
wsprintfA
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
CreateWindowExA
RegisterClassA
LoadCursorA
MessageBoxA
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
wsock32
listen
getsockname
accept
recv
bind
socket
ioctlsocket
htons
connect
send
WSAGetLastError
WSAStartup
closesocket
WSAAsyncSelect
ntohs
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE