OpnFiles.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0cd20c98e5dfc1550e3b84369a08ecc9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cd20c98e5dfc1550e3b84369a08ecc9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0cd20c98e5dfc1550e3b84369a08ecc9_JaffaCakes118
-
Size
226KB
-
MD5
0cd20c98e5dfc1550e3b84369a08ecc9
-
SHA1
c341cfd05cda60a34fcf8af60d5540629215e305
-
SHA256
43229d621989151dab1f815b06334f277b03bd787548db1c3f4edf3d1a5010fd
-
SHA512
78dd3adf182fb58ef7c9f091a1da49b3ffc738fe6ba835c7b69032735f67b53048f50e45878b020b268a07ba739797296312aa506e1bbf401e85acf7661a0332
-
SSDEEP
6144:enPY8pYe8d2qysl/VL/NUGjnz8QKn2Ziumz5+L:eRY3GehiGVZiu+U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cd20c98e5dfc1550e3b84369a08ecc9_JaffaCakes118
Files
-
0cd20c98e5dfc1550e3b84369a08ecc9_JaffaCakes118.exe windows:5 windows x86 arch:x86
f2177ecc673dae04436ff4acbdd10c15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
__set_app_type
_except_handler3
??1type_info@@UAE@XZ
__p__fmode
?terminate@@YAXXZ
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__winitenv
_wtol
malloc
realloc
wcsstr
free
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_wcsicmp
wcsncpy
_wgetcwd
_c_exit
_exit
_XcptFilter
_cexit
_controlfp
exit
calloc
wcstod
wcstol
wcsncmp
fflush
fprintf
wcschr
strtok
wcslen
_wcsnicmp
sprintf
wcstok
_iob
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
LookupAccountSidW
RegSetValueExW
RegConnectRegistryW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
kernel32
VerSetConditionMask
VerifyVersionInfoW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetTimeFormatW
WideCharToMultiByte
OpenProcess
GetStdHandle
GetConsoleScreenBufferInfo
CloseHandle
GetLogicalDrives
GetDriveTypeW
GetVolumeInformationW
lstrcpynW
FindFirstFileW
FindClose
SetConsoleCursorPosition
WriteConsoleW
LocalFree
FormatMessageW
ReadConsoleW
ReadFile
SetConsoleMode
GetConsoleMode
FileTimeToSystemTime
GetComputerNameExW
GetCurrentProcess
QueryPerformanceCounter
lstrlenW
lstrcpyW
SetLastError
lstrcmpW
lstrcatW
lstrcmpiW
GetLastError
CompareStringW
FreeLibrary
LoadLibraryW
GetSystemDirectoryW
GetProcAddress
GetComputerNameW
MultiByteToWideChar
VirtualQuery
VirtualAlloc
VirtualFree
ntdll
RtlDestroyQueryDebugBuffer
RtlFreeHeap
RtlInitAnsiString
RtlAnsiStringToUnicodeString
RtlAllocateHeap
NtQuerySystemInformation
RtlInitUnicodeString
user32
LoadStringW
CharUpperW
wsprintfW
mpr
WNetGetLastErrorW
WNetCancelConnection2W
WNetAddConnection2W
netapi32
NetFileClose
NetApiBufferFree
NetFileEnum
NetServerGetInfo
secur32
GetUserNameExW
ws2_32
WSACleanup
gethostbyaddr
inet_addr
WSAGetLastError
WSAStartup
gethostbyname
framedyn
?Left@CHString@@QBE?AV1@H@Z
?Mid@CHString@@QBE?AV1@HH@Z
??4CHString@@QAEABV0@ABV0@@Z
?Format@CHString@@QAAXPBGZZ
??0CHString@@QAE@XZ
??4CHString@@QAEABV0@PBG@Z
??1CHString@@QAE@XZ
?GetData@CHString@@IBEPAUCHStringData@@XZ
?MakeUpper@CHString@@QAEXXZ
?Find@CHString@@QBEHPBG@Z
?Right@CHString@@QBE?AV1@H@Z
??YCHString@@QAEABV0@PBG@Z
?Mid@CHString@@QBE?AV1@H@Z
?TrimRight@CHString@@QAEXXZ
??0CHString@@QAE@PBG@Z
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 21B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 424KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE