o:\out_Win32\Release\avp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
040033443bd9d9cd8a9bb2122e7f5805_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
040033443bd9d9cd8a9bb2122e7f5805_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
040033443bd9d9cd8a9bb2122e7f5805_JaffaCakes118
-
Size
404KB
-
MD5
040033443bd9d9cd8a9bb2122e7f5805
-
SHA1
03ae3e3e4869ff9a492e8f8d1e380126457f49b3
-
SHA256
670c6a424c6deadd49dc5c86ecd6182b7f3db9fb90fcb188997a5b9f0fa57fdc
-
SHA512
d082b0f8478e7681dfee09e9df0dd2670b53861b9978c9ead1629c780f061a2531364b61e965ed353def45189b4d909d8bef694e89e5d83c085e245a5c489d23
-
SSDEEP
12288:hdOdnNUR6mAAw04AtbXohGDXN64pwpeIvH4kTYRL:TGxAtbXaGDXN6BePPRL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 040033443bd9d9cd8a9bb2122e7f5805_JaffaCakes118
Files
-
040033443bd9d9cd8a9bb2122e7f5805_JaffaCakes118.exe windows:4 windows x86 arch:x86
6af3c7d677a8cb19d75a4efd05d89807
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
memmng
?InitMemMng@@YAHXZ
prremote
PRRegisterObject
PRCreateProcess
PRStopServer
PRIsValidProxy
PRInitialize
PRCloseProcessRequest
PRDeinitialize
PRUnregisterObject
PRGetObjectProxy
PRReleaseObjectProxy
fssync
FSSync_ScreeSet
FSSync_Init
FSSync_DR
FSSync_DUR
FSSync_DACL
FSSync_ScreeState
FSSync_ScreeStateEx
FSSync_ScreeStateEx2
FSSync_Done
FSSync_SetCheck
FSSync_ScreeActive
FSSync_Remove
FSSync_ScreeNotify
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
GetFileSize
GetCurrentProcessId
GetCurrentThreadId
CompareFileTime
GetLastError
GetDiskFreeSpaceExA
UnmapViewOfFile
WaitForMultipleObjects
CreateProcessA
MultiByteToWideChar
MapViewOfFile
DuplicateHandle
CreateEventA
CreateFileMappingA
GetFileAttributesA
GetModuleFileNameA
WideCharToMultiByte
SetEvent
DeleteFileA
FindClose
FindNextFileA
FindFirstFileA
ReleaseMutex
lstrcpynA
GetComputerNameA
lstrlenA
GetExitCodeProcess
GetDriveTypeA
CreateThread
GetModuleHandleA
OutputDebugStringA
CreateMutexW
OpenMutexW
GetModuleFileNameW
GetVersionExA
GetFileType
GetStdHandle
CreateMutexA
OpenMutexA
ExpandEnvironmentStringsW
GetPrivateProfileStringW
GetPrivateProfileIntW
FindFirstFileW
CreateProcessW
SetProcessAffinityMask
SetErrorMode
InitializeCriticalSection
DeleteCriticalSection
lstrcpyA
LeaveCriticalSection
EnterCriticalSection
SetProcessWorkingSetSize
FreeConsole
SetConsoleCtrlHandler
LoadLibraryW
lstrcatA
ExpandEnvironmentStringsA
GetTickCount
LocalFree
FormatMessageA
SetConsoleMode
GetConsoleMode
SetConsoleTitleA
AllocConsole
GetCurrentThread
SetConsoleCursorPosition
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
GetFullPathNameA
GetTempFileNameA
CreateDirectoryA
GetTempPathA
lstrlenW
GetVersion
GetLocalTime
CreateSemaphoreA
ReleaseSemaphore
VirtualAlloc
VirtualFree
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
WaitForSingleObject
GetExitCodeThread
CreateFileA
WriteFile
CloseHandle
FlushFileBuffers
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
HeapFree
QueryPerformanceCounter
GetProcessHeap
HeapAlloc
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineW
user32
wsprintfA
CharUpperBuffA
GetSystemMetrics
RegisterWindowMessageA
PostMessageA
ExitWindowsEx
DefWindowProcA
IsWindow
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
MsgWaitForMultipleObjects
DestroyWindow
CreateWindowExA
RegisterClassA
advapi32
CopySid
RegSetValueExA
RegCloseKey
RegQueryValueExA
SetFileSecurityA
RegOpenKeyExW
RegNotifyChangeKeyValue
OpenThreadToken
RevertToSelf
SetThreadToken
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
AllocateAndInitializeSid
FreeSid
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
StartServiceA
ControlService
QueryServiceStatus
DeleteService
CreateServiceA
RegSetValueExW
RegDeleteValueA
SetServiceStatus
RegOpenKeyA
RegQueryValueExW
GetLengthSid
IsValidSid
LookupAccountNameA
GetUserNameA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegCreateKeyA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
RegOpenKeyExA
shell32
SHFileOperationA
ShellExecuteExA
msvcr80
_encode_pointer
_lock
_unlock
_onexit
_decode_pointer
_except_handler4_common
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
exit
_acmdln
_initterm
_initterm_e
__dllonexit
_wcsicmp
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_mbscmp
_wtoi
strchr
memcpy
memmove
_set_invalid_parameter_handler
atoi
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??3@YAXPAX@Z
??0exception@std@@QAE@XZ
__CxxFrameHandler3
_vsnprintf_s
sscanf_s
memset
sprintf_s
strcpy_s
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
??2@YAPAXI@Z
strrchr
wcsrchr
_mbschr
_mbsicmp
_mbsnbicmp
_time32
printf
_getch
sprintf
_wmakepath
_wsplitpath
vsprintf_s
_set_error_mode
malloc
free
__argc
__argv
_snprintf_s
_beginthreadex
_itoa
setlocale
_mbslen
??_U@YAPAXI@Z
??_V@YAXPAX@Z
setvbuf
_fdopen
_open_osfhandle
__iob_func
_ismbblead
_localtime32
fflush
fprintf
_vsnprintf
fclose
fgets
fopen
strerror
_errno
_snprintf
getchar
getc
_flushall
sscanf
_splitpath
_mbsnbcat_s
_mbsnbcpy_s
_configthreadlocale
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 220KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.prdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE