t:\ses\x86\ship\0\opatchinst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0d6b9d3a1944345b82bf88e96887d782_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0d6b9d3a1944345b82bf88e96887d782_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0d6b9d3a1944345b82bf88e96887d782_JaffaCakes118
-
Size
1.9MB
-
MD5
0d6b9d3a1944345b82bf88e96887d782
-
SHA1
12cf9642d7cb21f2769667818ef172090d2a214d
-
SHA256
9ad73a760e45d1b47c7d9085d626a72b1306ea897bde3f01a8182a02da66e787
-
SHA512
536252f3949ab57b4ea685a8f3cdb078f48423c3e28154fcd9f0e61579347e92b464598190ecca6d2f20c7d859710999763a2a95072afd1ea301158822e895bc
-
SSDEEP
24576:DEs0uBm8z5YJitYHOWtD7yEF/wO2PHznOU1zGtBuqQz8hG7hQWzekW:YBus2WJy8tD7yEFD2fzOSStQqQz8L/9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d6b9d3a1944345b82bf88e96887d782_JaffaCakes118
Files
-
0d6b9d3a1944345b82bf88e96887d782_JaffaCakes118.exe windows:4 windows x86 arch:x86
c261979d0623d9d5245bed4e21fd0160
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenW
FreeLibrary
GetProcAddress
LoadLibraryA
CloseHandle
GetExitCodeProcess
WaitForSingleObject
MultiByteToWideChar
lstrlenA
GetFileSize
CreateFileA
CreateDirectoryA
DeleteFileA
GetTempFileNameA
GetTempPathA
GetFullPathNameA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CopyFileA
MoveFileA
ReadFile
ExpandEnvironmentStringsA
SetEvent
CreateEventA
SetFilePointer
LockResource
LoadResource
FindResourceA
GetSystemDirectoryA
GetUserDefaultLangID
GetSystemDefaultLangID
GetVersionExA
WriteFile
GlobalFree
GlobalAlloc
CompareStringA
GetCurrentProcess
WritePrivateProfileStringA
GetWindowsDirectoryA
SetCurrentDirectoryA
CreateProcessA
GetDiskFreeSpaceExA
GetModuleFileNameA
SetLastError
WideCharToMultiByte
SetFileTime
DosDateTimeToFileTime
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetCPInfo
HeapSize
Sleep
VirtualAlloc
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetFileType
GetCurrentDirectoryA
GetLastError
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
LocalFree
GetFileAttributesA
LocalAlloc
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapReAlloc
RtlUnwind
ExitThread
GetCurrentThreadId
CreateThread
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
oleaut32
SysAllocString
SysAllocStringByteLen
SysStringByteLen
VariantInit
VariantClear
GetErrorInfo
VariantCopy
VariantChangeType
SysStringLen
SysFreeString
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
ole32
CLSIDFromProgID
CoInitialize
CoTaskMemFree
OleRun
CLSIDFromString
CoCreateInstance
user32
SetWindowLongA
SendMessageA
GetWindowLongA
DestroyWindow
PostQuitMessage
DispatchMessageA
EnableMenuItem
EnableWindow
ShowWindow
UpdateWindow
GetDlgItem
PostMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
EndDialog
IsDlgButtonChecked
DialogBoxParamA
CreateDialogParamA
ExitWindowsEx
MessageBoxA
SetWindowTextA
SystemParametersInfoA
GetSystemMenu
CharNextA
PeekMessageA
gdi32
CreateFontIndirectA
Sections
.text Size: 516KB - Virtual size: 516KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 677KB - Virtual size: 677KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ