tlntSess.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0305288347cb3df6c6ec04a261a12936_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0305288347cb3df6c6ec04a261a12936_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0305288347cb3df6c6ec04a261a12936_JaffaCakes118
-
Size
105KB
-
MD5
0305288347cb3df6c6ec04a261a12936
-
SHA1
200ec12a57a0110373d9c87bb292486934694e41
-
SHA256
b3769b0024abe808df2e854603d571bc316ccb8425cc1bd1ed4a6b876dfa24d5
-
SHA512
7b7010be2f3d406c8383c22ee51f3637f2e2df02821814c192eb55ffa2267055cbb784a239dcf4c5c6cfb3811e6841ab6aa1ae0c4ee6ef52a4fee668ceda2241
-
SSDEEP
1536:3j+pnDmQzl+H1X6zlhs+J/5WkcyBvz/NQVs:z+pnE6zlhpWLwvzeVs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0305288347cb3df6c6ec04a261a12936_JaffaCakes118
Files
-
0305288347cb3df6c6ec04a261a12936_JaffaCakes118.exe windows:5 windows x86 arch:x86
81cbbc6ec3dbb7a06c9b60575f61b0d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
__p__commode
__p__fmode
__set_app_type
_controlfp
_adjust_fdiv
_initterm
_itoa
toupper
towlower
wcsncat
wcschr
_wcsnicmp
free
strncpy
strtoul
strchr
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
??3@YAXPAX@Z
__setusermatherr
sprintf
_strnicmp
_c_exit
malloc
wcscmp
strrchr
memmove
_stricmp
wcsrchr
isdigit
_except_handler3
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
wcscat
memchr
_strcmpi
wcsncpy
_wcsicmp
wcscpy
wcslen
_snwprintf
??2@YAPAXI@Z
_snprintf
calloc
advapi32
DuplicateTokenEx
LookupAccountSidW
CryptAcquireContextW
CreateProcessAsUserW
CryptReleaseContext
LsaOpenPolicy
LsaQueryInformationPolicy
LsaClose
LsaFreeMemory
ImpersonateLoggedOnUser
RevertToSelf
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
RegOpenKeyW
OpenProcessToken
LookupPrivilegeValueW
GetAce
CryptGenRandom
RegCreateKeyExW
RegSetKeySecurity
GetSecurityDescriptorLength
MakeSelfRelativeSD
ReportEventW
GetSidSubAuthority
RegOpenKeyExA
RegQueryValueExA
RegLoadKeyA
RegSetValueExW
RegCreateKeyA
AdjustTokenPrivileges
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LogonUserW
RegOpenKeyExW
RegQueryValueExW
RegisterEventSourceW
DeregisterEventSource
AllocateAndInitializeSid
OpenThreadToken
LookupAccountNameW
GetTokenInformation
EqualSid
RegCloseKey
FreeSid
kernel32
GetConsoleMode
CreateFileA
AllocConsole
FreeConsole
GetModuleFileNameA
lstrcpyW
TerminateProcess
SetEnvironmentVariableA
SetEnvironmentVariableW
GetExitCodeProcess
SetConsoleCtrlHandler
DuplicateHandle
GetCurrentProcess
GetCurrentThread
GetComputerNameExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
FormatMessageW
CreateEventW
WaitForSingleObject
ReleaseMutex
CloseHandle
CreateNamedPipeW
HeapFree
HeapAlloc
GetProcessHeap
VirtualFree
VirtualAlloc
OpenProcess
ExpandEnvironmentStringsA
CreateFileW
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
WaitForMultipleObjects
GetLastError
GetTickCount
GlobalFree
GlobalAlloc
SetLastError
SetHandleInformation
GetStdHandle
WideCharToMultiByte
GetConsoleCP
LoadLibraryW
GetSystemDirectoryW
lstrlenW
ReadFile
WriteFile
GetComputerNameW
GetLocalTime
CancelIo
lstrcpyA
lstrcatA
LocalFree
LocalAlloc
FormatMessageA
GetACP
GetOverlappedResult
ExitProcess
SetErrorMode
MultiByteToWideChar
GenerateConsoleCtrlEvent
SetConsoleScreenBufferSize
SetConsoleWindowInfo
GetConsoleScreenBufferInfo
LoadLibraryExW
IsDBCSLeadByte
WriteConsoleInputA
ExpandEnvironmentStringsW
WriteConsoleW
ReadConsoleOutputA
ReadConsoleOutputW
WriteConsoleInputW
ntdll
RtlEqualUnicodeString
DbgPrint
RtlSubAuthorityCountSid
RtlSubAuthoritySid
RtlInitUnicodeString
user32
VkKeyScanW
GetProcessWindowStation
wsprintfW
CharToOemA
LoadStringW
MapVirtualKeyW
CloseDesktop
OpenDesktopW
CloseWindowStation
SetUserObjectSecurity
oleaut32
VarBstrFromDate
VarDateFromUdate
SysFreeString
psapi
EnumProcesses
security
AcceptSecurityContext
QueryContextAttributesW
ImpersonateSecurityContext
RevertSecurityContext
AcquireCredentialsHandleW
QuerySecurityPackageInfoW
DeleteSecurityContext
FreeCredentialsHandle
FreeContextBuffer
netapi32
NetGetAnyDCName
NetUserGetInfo
NetApiBufferFree
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCancelConnection2W
WNetCloseEnum
WNetAddConnection2W
ws2_32
WSAStringToAddressA
shutdown
WSASocketW
ioctlsocket
setsockopt
WSAStartup
closesocket
WSACleanup
getpeername
WSASetLastError
getservbyport
ntohs
gethostbyaddr
htons
getservbyname
htonl
inet_ntoa
gethostbyname
gethostname
WSAGetLastError
inet_addr
shell32
SHGetFolderPathW
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE