d:\dbs\el\dec\target\x64\ship\click2run\x-none\IntegratedOffice.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2c2a25ffe3ec127d6a964dc515582721_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c2a25ffe3ec127d6a964dc515582721_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2c2a25ffe3ec127d6a964dc515582721_JaffaCakes118
-
Size
4.5MB
-
MD5
2c2a25ffe3ec127d6a964dc515582721
-
SHA1
bbb4e6f96884fcea6dede1af25212ff2dcb6bb0d
-
SHA256
65353e6cc9c708301dcc03b33f17a7b196186ae3b4b4459dbef8262a3f4bd372
-
SHA512
c8e531ea72418ad1e230931b3d2a0670b7e9c6a38dd58773e2728d0d1903eaa356a08b1e37dc20752b0fa3681d7e21edcdd3b86165ee45a1aeaa94035da82e4b
-
SSDEEP
49152:FdRba8fD8qinfMSKJXIUQREV1QOTu1U5ai2VzYo5UC9RhuCTFKlaxV5dgbTnbYZ:C/IJsiCVsop7cTnI/o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c2a25ffe3ec127d6a964dc515582721_JaffaCakes118
Files
-
2c2a25ffe3ec127d6a964dc515582721_JaffaCakes118.exe windows:6 windows x64 arch:x64
d3751ab33b3858f3b8b8d3275495baba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
gdi32
GetDeviceCaps
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
advapi32
RegCreateKeyExW
RegCloseKey
EventWriteTransfer
EventRegister
EventUnregister
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteTreeW
RegDeleteKeyW
RegGetValueW
RegSetValueExW
RegDeleteValueW
GetTokenInformation
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
RegNotifyChangeKeyValue
RevertToSelf
EventWrite
OpenThreadToken
OpenProcessToken
GetLengthSid
CopySid
InitializeAcl
AddAccessAllowedAce
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
CheckTokenMembership
CreateWellKnownSid
EqualSid
kernel32
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetCurrentProcess
GetLastError
CompareStringEx
IsWow64Process
MultiByteToWideChar
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
DecodePointer
SetLastError
DeactivateActCtx
ActivateActCtx
LoadLibraryW
FindActCtxSectionStringW
CreateActCtxW
GetModuleFileNameW
GetModuleHandleExW
QueryActCtxW
OutputDebugStringA
LocalFree
FindClose
UnmapViewOfFile
CloseHandle
CreateFileMappingA
MapViewOfFile
Sleep
GetStringTypeExW
GetUserDefaultLCID
LCMapStringW
FreeLibrary
GetSystemTimeAsFileTime
GetCurrentThreadId
FlsAlloc
TlsAlloc
FlsFree
TlsFree
FlsGetValue
TlsGetValue
FlsSetValue
TlsSetValue
GetTickCount64
GetProcAddress
K32GetProcessMemoryInfo
GlobalMemoryStatusEx
LeaveCriticalSection
EnterCriticalSection
LocalAlloc
WideCharToMultiByte
CreateEventW
SetEvent
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetProcessTimes
TerminateProcess
GetModuleFileNameA
GetShortPathNameA
K32GetModuleFileNameExW
CreateProcessW
GetModuleHandleW
LoadLibraryExW
FindResourceW
SizeofResource
LoadResource
VerSetConditionMask
VerifyVersionInfoW
OpenProcess
GetCurrentProcessId
GetStringTypeW
GetVersionExW
GetUserDefaultLocaleName
IsValidCodePage
SystemTimeToFileTime
FileTimeToSystemTime
GetCPInfoExW
GetDiskFreeSpaceExW
CreateFileW
DeviceIoControl
GetComputerNameW
WriteConsoleW
FormatMessageW
GetLogicalProcessorInformation
GetNativeSystemInfo
GetSystemDirectoryW
HeapFree
HeapAlloc
GetProcessHeap
WaitForSingleObject
CreateThread
WaitForMultipleObjectsEx
CreateEventExW
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
CloseThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CreateThreadpoolTimer
CloseThreadpoolWait
SetThreadpoolWait
WaitForThreadpoolWaitCallbacks
CreateThreadpoolWait
CreateThreadpoolWork
SubmitThreadpoolWork
ReleaseSemaphore
WaitForSingleObjectEx
QueryDepthSList
TryEnterCriticalSection
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
RtlCaptureStackBackTrace
ReleaseMutex
CreateMutexExW
OpenMutexW
GetTempPathW
GetLongPathNameW
ResetEvent
QueryPerformanceCounter
QueryPerformanceFrequency
VirtualProtectEx
GetSystemInfo
GlobalFree
GlobalAlloc
ReadFile
WriteFile
GetFileSizeEx
SetEndOfFile
SetFilePointerEx
GetOverlappedResult
FlushFileBuffers
CancelIoEx
GetFileAttributesExW
DeleteFileW
CreateDirectoryW
FindFirstFileExW
FindNextFileW
GetFileType
GetTempFileNameW
SetFileInformationByHandle
GetFileInformationByHandleEx
SignalObjectAndWait
GetProcessAffinityMask
GetLogicalProcessorInformationEx
CreateWaitableTimerW
SetWaitableTimerEx
CancelWaitableTimer
GetTickCount
WerRegisterMemoryBlock
WerUnregisterMemoryBlock
QueryFullProcessImageNameW
IsProcessorFeaturePresent
CreateIoCompletionPort
PostQueuedCompletionStatus
GetThreadIOPendingFlag
GetCurrentThread
GetQueuedCompletionStatus
IsDebuggerPresent
WaitForMultipleObjects
GetStartupInfoW
CreateMemoryResourceNotification
GetSystemPowerStatus
IsSystemResumeAutomatic
QueryUnbiasedInterruptTime
OutputDebugStringW
RtlCaptureContext
GetModuleHandleA
VirtualFree
ExpandEnvironmentStringsW
VirtualAlloc
OpenEventA
CreateEventA
OpenMutexA
CreateMutexA
OpenSemaphoreA
CreateSemaphoreA
OpenFileMappingA
ProcessIdToSessionId
GetPriorityClass
GetExitCodeProcess
GetTimeZoneInformation
IsValidLocale
LCMapStringEx
GetPhysicallyInstalledSystemMemory
GetProductInfo
SwitchToThread
GetACP
SetStdHandle
HeapReAlloc
EnumSystemLocalesW
GetTimeFormatW
GetDateFormatW
ExitProcess
GetStdHandle
HeapSize
GetConsoleCP
GetConsoleMode
UnregisterWaitEx
VirtualProtect
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
GetThreadPriority
SetThreadPriority
CreateTimerQueue
InterlockedFlushSList
RtlUnwindEx
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualQuery
LoadLibraryExA
GetLocalTime
GetOEMCP
RtlVirtualUnwind
RtlLookupFunctionEntry
GetLocaleInfoW
CompareStringW
GetCPInfo
InitializeCriticalSectionAndSpinCount
EncodePointer
RtlPcToFileHeader
DuplicateHandle
DeleteTimerQueueTimer
CreateTimerQueueTimer
GetUserGeoID
GetSystemDefaultLCID
ole32
CoRevokeInitializeSpy
CLSIDFromString
CoTaskMemFree
CoCreateInstance
CoSetProxyBlanket
IIDFromString
StringFromGUID2
CoCreateGuid
CoInitializeEx
CoUninitialize
CreateStreamOnHGlobal
CoCreateFreeThreadedMarshaler
CoRegisterInitializeSpy
CoTaskMemAlloc
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 432KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ