OpnFiles.pdb
Static task
static1
Behavioral task
behavioral1
Sample
38f8827802a59cd34c11298bcbf0229c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38f8827802a59cd34c11298bcbf0229c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
38f8827802a59cd34c11298bcbf0229c_JaffaCakes118
-
Size
221KB
-
MD5
38f8827802a59cd34c11298bcbf0229c
-
SHA1
569dfaf3807b7a1587985b3862506137b7be6a63
-
SHA256
2172f2ecf904b573b7a2f6d1303c924915b1291542b816cd31004884645fc02f
-
SHA512
7d245bedd00cb92c4ad3a1839570b871629a9f5fcec3a937016543eaa33d9d4d231431866ee4929e27a58bbe38d988dfaaeae5c65df5f72b7752287f3993dbbf
-
SSDEEP
6144:VHllEvbHVpL5Zam0lKnNRRbErpV8NArRwK/6IZ:Dl4VMm0SRqpqNqJn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38f8827802a59cd34c11298bcbf0229c_JaffaCakes118
Files
-
38f8827802a59cd34c11298bcbf0229c_JaffaCakes118.exe windows:6 windows x86 arch:x86
8b48f8e518a643cd2b45d82df0c25a26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegConnectRegistryW
RegSetValueExW
LookupAccountSidW
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
kernel32
CompareStringW
GetComputerNameW
VirtualQuery
VirtualAlloc
VirtualFree
FindClose
FindFirstFileW
GetVolumeInformationW
GetDriveTypeW
GetSystemDirectoryW
GetLogicalDrives
GetConsoleScreenBufferInfo
GetStdHandle
CloseHandle
OpenProcess
GetCurrentProcess
GetTimeFormatW
SetThreadUILanguage
FileTimeToSystemTime
GetModuleFileNameW
SetConsoleMode
ReadFile
ReadConsoleW
WriteConsoleW
ExitProcess
GetConsoleOutputCP
HeapReAlloc
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
HeapValidate
WideCharToMultiByte
MultiByteToWideChar
CompareStringA
GetThreadLocale
lstrlenW
lstrlenA
GetFileType
GetConsoleMode
VerifyVersionInfoW
FormatMessageW
LocalFree
UnhandledExceptionFilter
TerminateProcess
GetLastError
SetLastError
GetComputerNameExW
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
msvcrt
__iob_func
wcstod
wcstol
__p__commode
fprintf
_controlfp
_except_handler4_common
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
wcstok
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
??2@YAPAXI@Z
??3@YAXPAX@Z
_wgetcwd
??_U@YAPAXI@Z
wcstoul
_CxxThrowException
??_V@YAXPAX@Z
__CxxFrameHandler3
_vsnwprintf
memset
_iob
_memicmp
_get_osfhandle
_errno
_fileno
fflush
user32
CharUpperW
LoadStringW
mpr
WNetCancelConnection2W
WNetGetLastErrorW
WNetAddConnection2W
netapi32
NetFileClose
NetFileEnum
NetApiBufferFree
NetServerGetInfo
secur32
GetUserNameExW
ws2_32
WSAGetLastError
WSAStartup
FreeAddrInfoW
GetNameInfoW
WSACleanup
WSALookupServiceBeginW
WSALookupServiceNextW
WSALookupServiceEnd
GetAddrInfoW
framedynos
?Find@CHString@@QBEHPBG@Z
??1CHString@@QAE@XZ
??4CHString@@QAEABV0@PBG@Z
??0CHString@@QAE@XZ
??4CHString@@QAEABV0@ABV0@@Z
?Mid@CHString@@QBE?AV1@H@Z
??YCHString@@QAEABV0@PBG@Z
?Right@CHString@@QBE?AV1@H@Z
?GetData@CHString@@IBEPAUCHStringData@@XZ
?Format@CHString@@QAAXPBGZZ
??0CHString@@QAE@PBG@Z
?Left@CHString@@QBE?AV1@H@Z
?Mid@CHString@@QBE?AV1@HH@Z
ntdll
NtQuerySystemInformation
RtlAllocateHeap
VerSetConditionMask
RtlInitUnicodeString
shlwapi
StrStrIW
StrChrW
StrChrIW
StrStrW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 160KB - Virtual size: 420KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE