c:\workarea\8.783.2.2\apps\ccc\Source\Utilities\CCC3DPrev\build\b_rel\cccprev.pdb
Static task
static1
Behavioral task
behavioral1
Sample
157ac7c358ec9119c86dc14ef37e5ef2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
157ac7c358ec9119c86dc14ef37e5ef2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
157ac7c358ec9119c86dc14ef37e5ef2_JaffaCakes118
-
Size
572KB
-
MD5
157ac7c358ec9119c86dc14ef37e5ef2
-
SHA1
6e55f0aa176742e68fbe2c71d9b59be1ee343736
-
SHA256
a36a6a1380919590f4bd49dd5c3ec5be4b6bdba472d003a53d26c23ee5239656
-
SHA512
0ce108e7a8b9d5438485f1471c599a2d0115a2c9413f553b34d6bcda3568601f711d1a1a5cb10ba1199ff2748cffdf9c43560f83d85c9e47c40af8440458a728
-
SSDEEP
6144:X4MYKx+7E0jQkIPrWshIVCid5XoyfYVziJuTkOvSTB3C7zo0naGJAq:Ny7E0yWSCXPATkOvSTIPaGJAq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 157ac7c358ec9119c86dc14ef37e5ef2_JaffaCakes118
Files
-
157ac7c358ec9119c86dc14ef37e5ef2_JaffaCakes118.exe windows:4 windows x86 arch:x86
b9fd530c4aeca96aaa76aef798e4a401
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
d3d9
Direct3DCreate9
d3dx9_29
D3DXLoadMeshFromXInMemory
D3DXVec3Normalize
D3DXMatrixInverse
D3DXLoadSurfaceFromSurface
D3DXCreateTextureFromFileInMemory
D3DXCreateTextureFromFileA
D3DXMatrixTranspose
D3DXPlaneTransform
D3DXCreateFontA
D3DXLoadMeshFromXA
D3DXMatrixMultiply
D3DXCreateEffect
D3DXCreateEffectFromFileA
D3DXQuaternionNormalize
D3DXQuaternionSlerp
D3DXMatrixReflect
D3DXMatrixPerspectiveFovRH
kernel32
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCPInfo
LCMapStringW
LocalFree
SetEndOfFile
CreateFileW
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
GetTickCount
OutputDebugStringA
GetCommandLineA
Sleep
GetVersionExA
lstrlenA
MultiByteToWideChar
GetLastError
CreateFileA
SetFilePointer
WriteFile
ReadFile
CloseHandle
SetLastError
WriteConsoleA
LoadLibraryA
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetOEMCP
GetACP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LeaveCriticalSection
GetFileType
GetStdHandle
SetHandleCount
HeapSize
LCMapStringA
ExitProcess
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetModuleHandleA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
GetProcAddress
GetCurrentThreadId
user32
UpdateWindow
ValidateRect
PostMessageA
IsWindow
SendMessageA
EndPaint
DestroyWindow
SetTimer
RegisterClassExA
PostQuitMessage
KillTimer
LoadIconA
GetClientRect
BeginPaint
TranslateMessage
InvalidateRect
UnregisterClassA
GetWindowLongA
CreateWindowExA
PeekMessageA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
LoadCursorA
AdjustWindowRect
SetRect
gdi32
GetStockObject
ole32
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CoInitialize
oleaut32
GetActiveObject
VariantClear
SysAllocString
Sections
.text Size: 360KB - Virtual size: 358KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE