C:\Symbols\driver\Release\LVPrcSrv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0e99a8e84df08e93d9f3b369cf9d9eda_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0e99a8e84df08e93d9f3b369cf9d9eda_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0e99a8e84df08e93d9f3b369cf9d9eda_JaffaCakes118
-
Size
146KB
-
MD5
0e99a8e84df08e93d9f3b369cf9d9eda
-
SHA1
fd3166476deca4f205f7d0e7cfeec19f2ca4e82a
-
SHA256
3d1224954eddcba63ed219cb3e0c139087c5d58606347b387904b595f94fdb8d
-
SHA512
31e2ba12ce958eb26d1fed7b5099e29bb9e3915400171de73821d70962d408eb66358a5e8625fd88271977c6fb62383839fee6d926ca5504055e7582eb6721fb
-
SSDEEP
3072:mC5yIyaGpP1dpSEO6yjJFFNaGNjh5JJwl3t4f2dddddsRJXGw:mIyXaQ1dpSJDrFNaGNjhylef2dddddY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e99a8e84df08e93d9f3b369cf9d9eda_JaffaCakes118
Files
-
0e99a8e84df08e93d9f3b369cf9d9eda_JaffaCakes118.exe windows:5 windows x86 arch:x86
7ab7763d832be7ca9247270f6fb7ac6d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
psapi
GetModuleFileNameExA
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
GetModuleInformation
setupapi
SetupInstallServicesFromInfSectionA
SetupCloseInfFile
SetupOpenInfFileA
kernel32
CreateMutexA
GetLastError
ReleaseMutex
WaitForMultipleObjectsEx
WaitForMultipleObjects
GetSystemTime
GetVersionExA
Sleep
SetEvent
GetModuleHandleA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrlenA
FormatMessageA
WriteProcessMemory
CheckRemoteDebuggerPresent
GetTickCount
GetCurrentThreadId
DeviceIoControl
SetThreadPriority
GetCurrentThread
ResetEvent
CreateThread
CancelIo
QueryPerformanceCounter
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetModuleFileNameA
GetCurrentProcess
OpenProcess
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
VirtualAllocEx
GetVersion
CopyFileA
CreateFileA
MoveFileExA
DeleteFileA
GetTempPathA
CreateDirectoryA
LocalFree
CreateEventA
GetFileAttributesA
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
RaiseException
GetStringTypeA
GetStringTypeW
HeapSize
SetEndOfFile
ReadFile
CompareStringA
SetStdHandle
HeapAlloc
HeapFree
RtlUnwind
ExitThread
GetCommandLineA
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
ExitProcess
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetHandleCount
GetFileType
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
MultiByteToWideChar
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoA
InitializeCriticalSection
user32
CharLowerA
LoadStringA
advapi32
SetServiceStatus
RegOpenKeyA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
QueryServiceConfigA
ControlService
QueryServiceStatus
DeleteService
CreateServiceA
ChangeServiceConfig2A
ChangeServiceConfigA
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
LookupPrivilegeValueA
PrivilegeCheck
AdjustTokenPrivileges
OpenProcessToken
DuplicateTokenEx
GetTokenInformation
SetTokenInformation
CreateProcessAsUserA
RevertToSelf
ConvertStringSecurityDescriptorToSecurityDescriptorA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
SHGetFolderPathA
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ