C:\mmp\source\setup\keywordkr\setup\atlexe\atlexe.cpp1kkr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
14c31a32d4376a32005cd1a4e4d91a38_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14c31a32d4376a32005cd1a4e4d91a38_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14c31a32d4376a32005cd1a4e4d91a38_JaffaCakes118
-
Size
145KB
-
MD5
14c31a32d4376a32005cd1a4e4d91a38
-
SHA1
46d21ee87f4d295831e3109ebf879a3d56684ca2
-
SHA256
6dfa1792251ef1763d03bc7741f7ef71caa7f1a7ec63dc2e3c7e416ab2380e67
-
SHA512
6ceac243a683d3e60b3d58c159b8ad7a3759a8ead3c9a3b9ce9d68e0de1616d559c8946743f6b3782456bed865c3881ede428d3e0c8bf9671584502dac47f145
-
SSDEEP
3072:VUED9xKOOOxOOOOOsOOOOZOOOOOOOSOKOOOOrOOOOOXOOdOOOWOOOOOOxOOOOOOo:VRxIt6TJTm94r74
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14c31a32d4376a32005cd1a4e4d91a38_JaffaCakes118
Files
-
14c31a32d4376a32005cd1a4e4d91a38_JaffaCakes118.exe windows:5 windows x86 arch:x86
b10115a801e4af0d95d2f845554421ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
GetFileAttributesExA
ExpandEnvironmentStringsA
lstrcatA
lstrcpyA
SetLastError
CloseHandle
WaitForSingleObject
GetLastError
CreateRemoteThread
GetExitCodeProcess
DuplicateHandle
GetCurrentProcess
GetModuleHandleA
CreateThread
GetCurrentThreadId
lstrlenW
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
InterlockedIncrement
InterlockedDecrement
SetEvent
GetTickCount
lstrcmpiA
GetLocalTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileTime
CreateFileA
CreateMutexA
RemoveDirectoryA
CreateDirectoryA
GetTempPathA
GetCurrentProcessId
OpenProcess
MoveFileA
DeleteFileA
GetCommandLineA
lstrlenA
GetVersionExA
Sleep
DeleteCriticalSection
InitializeCriticalSection
RaiseException
WideCharToMultiByte
GetModuleFileNameA
MultiByteToWideChar
GetProcessHeap
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
SetFilePointer
GetFileType
SetHandleCount
ReadFile
GetStdHandle
ExitProcess
GetConsoleMode
GetConsoleCP
WriteFile
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
VirtualFree
HeapCreate
GetStartupInfoA
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
HeapFree
HeapReAlloc
HeapAlloc
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
advapi32
RegOpenKeyExA
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
SysStringLen
DispCallFunc
LoadTypeLi
SysFreeString
SysAllocString
VariantInit
LoadRegTypeLi
user32
FindWindowA
wsprintfA
MessageBoxA
IsWindow
GetClassNameA
GetSystemMetrics
PostThreadMessageA
LoadCursorA
RegisterClassExA
EndDialog
PostQuitMessage
DefWindowProcA
CreateWindowExA
UpdateWindow
RegisterWindowMessageA
SendMessageTimeoutA
ShowWindow
MoveWindow
BringWindowToTop
SetForegroundWindow
shlwapi
PathFileExistsA
PathGetArgsA
PathFindFileNameA
PathRemoveFileSpecA
PathRemoveBlanksA
PathIsDirectoryA
StrStrIW
ws2_32
closesocket
recv
send
__WSAFDIsSet
select
connect
ioctlsocket
htons
socket
WSAStartup
gethostbyname
netapi32
Netbios
psapi
EnumProcesses
GetModuleFileNameExA
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE