t:\ses\x86\ship\0\opatchinst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
049555ef8d6c007a5f4787b6cd59af32_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
049555ef8d6c007a5f4787b6cd59af32_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
049555ef8d6c007a5f4787b6cd59af32_JaffaCakes118
-
Size
2.0MB
-
MD5
049555ef8d6c007a5f4787b6cd59af32
-
SHA1
4140ebb329f06175f093dc34252837d2a84ad0d2
-
SHA256
6996724c8e8caf29c9283f217bf204854fe531d0ace2908c611beade967523a8
-
SHA512
a86f81b83530b992fee2b43c11fded7cb911f758d1a90e67f46ed4059a90d346ef95e70bacd08470acd436623733b0959c85dcdaf792783a15bf0a74b46a68fa
-
SSDEEP
24576:SEs0uBm8z5YJitYHOWtDDy4Qaih2+F7vDWONDf5kU/c+pO9:1Bus2WJy8tDDyUihFF7vZNkU/c+pG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 049555ef8d6c007a5f4787b6cd59af32_JaffaCakes118
Files
-
049555ef8d6c007a5f4787b6cd59af32_JaffaCakes118.exe windows:4 windows x86 arch:x86
c261979d0623d9d5245bed4e21fd0160
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenW
FreeLibrary
GetProcAddress
LoadLibraryA
CloseHandle
GetExitCodeProcess
WaitForSingleObject
MultiByteToWideChar
lstrlenA
GetFileSize
CreateFileA
CreateDirectoryA
DeleteFileA
GetTempFileNameA
GetTempPathA
GetFullPathNameA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CopyFileA
MoveFileA
ReadFile
ExpandEnvironmentStringsA
SetEvent
CreateEventA
SetFilePointer
LockResource
LoadResource
FindResourceA
GetSystemDirectoryA
GetUserDefaultLangID
GetSystemDefaultLangID
GetVersionExA
WriteFile
GlobalFree
GlobalAlloc
CompareStringA
GetCurrentProcess
WritePrivateProfileStringA
GetWindowsDirectoryA
SetCurrentDirectoryA
CreateProcessA
GetDiskFreeSpaceExA
GetModuleFileNameA
SetLastError
WideCharToMultiByte
SetFileTime
DosDateTimeToFileTime
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetCPInfo
HeapSize
Sleep
VirtualAlloc
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetFileType
GetCurrentDirectoryA
GetLastError
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
LocalFree
GetFileAttributesA
LocalAlloc
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapReAlloc
RtlUnwind
ExitThread
GetCurrentThreadId
CreateThread
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
oleaut32
SysAllocString
SysAllocStringByteLen
SysStringByteLen
VariantInit
VariantClear
GetErrorInfo
VariantCopy
VariantChangeType
SysStringLen
SysFreeString
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
ole32
CLSIDFromProgID
CoInitialize
CoTaskMemFree
OleRun
CLSIDFromString
CoCreateInstance
user32
SetWindowLongA
SendMessageA
GetWindowLongA
DestroyWindow
PostQuitMessage
DispatchMessageA
EnableMenuItem
EnableWindow
ShowWindow
UpdateWindow
GetDlgItem
PostMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
EndDialog
IsDlgButtonChecked
DialogBoxParamA
CreateDialogParamA
ExitWindowsEx
MessageBoxA
SetWindowTextA
SystemParametersInfoA
GetSystemMenu
CharNextA
PeekMessageA
gdi32
CreateFontIndirectA
Sections
.text Size: 516KB - Virtual size: 516KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 733KB - Virtual size: 733KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ