d:\Program\Soho\Worm\Spawn\Release\spawn.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0cff8d0a000f9e919f79e218d8459bb8_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0cff8d0a000f9e919f79e218d8459bb8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0cff8d0a000f9e919f79e218d8459bb8_JaffaCakes118
-
Size
92KB
-
MD5
0cff8d0a000f9e919f79e218d8459bb8
-
SHA1
3ee551032a1cf3c7acd90f2c3dc0e21057db10e8
-
SHA256
ae32054f79eff4ed573b4b6b90decc13e74e2d50078827bf3d9372da2de1205b
-
SHA512
465d56c1386fea6dd397989499891589cfd531de87754b72b0f4079cfcd9237acf0afdcff734a90da743c14aebffc4258df4917072553d3d210cef62b49df5ec
-
SSDEEP
1536:onsb/UYUnfgc+FZ3FDF3jS8dyRRcH5kIOenToIf54A9a/ro:oniUYmfZ+f3FxjddyRRuK6TBfX9Kr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cff8d0a000f9e919f79e218d8459bb8_JaffaCakes118
Files
-
0cff8d0a000f9e919f79e218d8459bb8_JaffaCakes118.dll windows:4 windows x86 arch:x86
a0bc2d38f63f69c3e54c1c93b0bc3017
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetThreadLocale
GetProcAddress
GetModuleHandleA
CreateThread
GetLastError
CreateMutexA
Sleep
GetTickCount
GetCurrentProcessId
lstrlenA
MultiByteToWideChar
FindClose
FindNextFileA
lstrcmpiA
FindFirstFileA
lstrcatA
lstrcpyA
CopyFileA
MoveFileExA
DeleteFileA
lstrcpynA
GetLocaleInfoA
DeleteCriticalSection
Process32Next
Process32First
CreateToolhelp32Snapshot
CloseHandle
OpenMutexA
VirtualFree
ReadFile
VirtualAlloc
GetFileSize
GetFileTime
CreateFileA
SetFileTime
WriteFile
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
ExitProcess
GetACP
InterlockedExchange
InitializeCriticalSection
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
VirtualProtectEx
SetLastError
SetFilePointer
SetEndOfFile
UnmapViewOfFile
WriteProcessMemory
VirtualQueryEx
ReadProcessMemory
GetCurrentProcess
lstrcmpiW
MapViewOfFile
CreateFileMappingA
user32
EnumWindows
GetWindowThreadProcessId
IsWindowVisible
advapi32
RegEnumValueA
RegCloseKey
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
shlwapi
StrStrIA
PathFileExistsA
msvcr71
__dllonexit
_onexit
_initterm
malloc
_adjust_fdiv
__CppXcptFilter
__security_error_handler
memcpy
free
_except_handler3
memset
__CxxFrameHandler
?terminate@@YAXXZ
_snprintf
memcmp
_CxxThrowException
??3@YAXPAX@Z
??2@YAPAXI@Z
??1type_info@@UAE@XZ
dbghelp
ImageDirectoryEntryToData
iphlpapi
SendARP
ws2_32
sendto
closesocket
setsockopt
socket
WSACleanup
gethostname
gethostbyname
inet_addr
htons
WSAStartup
recvfrom
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ