rtcshare.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0a4bf2aa0bd37f7c9e5a8aac5b32e481_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0a4bf2aa0bd37f7c9e5a8aac5b32e481_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0a4bf2aa0bd37f7c9e5a8aac5b32e481_JaffaCakes118
-
Size
77KB
-
MD5
0a4bf2aa0bd37f7c9e5a8aac5b32e481
-
SHA1
88695a46a2f4e3de864cf44143cb96693c9ceed7
-
SHA256
e0db31fdc460f9503e3ce6fda349ae36094c2a05a9f4293741b89c17909d78c1
-
SHA512
6ea693ddeb4324d886b90de2a9ac733a2500c8854efbe40aadbc6fb3700d9759a74264f3ec43e9bfb7c5b9ef6e41f408bd178475473d0cb663dd2b34b5adedde
-
SSDEEP
1536:f9t1EC3XEdTxBe97sjeoOsdkqV7ERS8T4lKiQ7EdbMZLRcFl34NHnjW20lLhms:f2dLs4yoveqRExuKiQ77BRCoNHnyPks
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a4bf2aa0bd37f7c9e5a8aac5b32e481_JaffaCakes118
Files
-
0a4bf2aa0bd37f7c9e5a8aac5b32e481_JaffaCakes118.exe windows:5 windows x86 arch:x86
55d107cfc57c47a220ce37f2edc4aedd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_cexit
exit
_wcmdln
__wgetmainargs
_initterm
_XcptFilter
_exit
_c_exit
wcscmp
_wcsicmp
wcslen
_wcsnicmp
_snwprintf
??2@YAPAXI@Z
_purecall
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
wcscpy
wcscat
??3@YAXPAX@Z
atl
ord35
ord31
ord44
ord11
ord10
ord30
ord58
ord32
ord45
ord20
ord17
ord23
ord57
ord18
ord43
ord16
ord21
advapi32
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
kernel32
HeapAlloc
LoadLibraryA
GetProcessHeap
VirtualAlloc
GetSystemTimeAsFileTime
HeapFree
GetStartupInfoW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
VirtualFree
lstrcpyW
HeapDestroy
FreeLibrary
GetLastError
lstrlenW
FlushInstructionCache
GetCurrentProcess
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
SetLastError
GetModuleFileNameW
GetCurrentProcessId
CloseHandle
CreateMutexW
lstrcmpiW
GetCommandLineW
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
IsBadWritePtr
IsBadStringPtrW
lstrlenA
IsBadStringPtrA
LocalFree
GetModuleHandleW
FormatMessageW
GetCurrentThreadId
GetProcAddress
LoadLibraryW
QueryPerformanceCounter
GetTickCount
HeapCreate
gdi32
DeleteObject
user32
SetDlgItemTextW
SendDlgItemMessageW
EndDialog
CallWindowProcW
SetForegroundWindow
FindWindowW
SystemParametersInfoW
GetMonitorInfoW
MonitorFromRect
LoadStringW
CreateWindowExW
DispatchMessageW
TranslateMessage
GetMessageW
PostMessageW
CharNextW
SendMessageW
ShowWindow
LoadBitmapW
LoadImageW
SetWindowTextW
SetWindowPos
GetClientRect
SetTimer
KillTimer
MessageBoxW
DestroyWindow
SetWindowLongW
GetSysColorBrush
GetSystemMetrics
PostQuitMessage
DefWindowProcW
GetWindowLongW
comctl32
CreateStatusWindowW
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
ord17
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysAllocString
LoadRegTypeLi
SafeArrayGetElement
VariantClear
SysAllocStringLen
SysStringLen
SysFreeString
shell32
CommandLineToArgvW
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 772B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
XOR Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE