H:\D\Misha\bho\runexpl\runexpl\Release\smphost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3c02f47aebb8dc7a63f5518616c7933c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c02f47aebb8dc7a63f5518616c7933c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3c02f47aebb8dc7a63f5518616c7933c_JaffaCakes118
-
Size
382KB
-
MD5
3c02f47aebb8dc7a63f5518616c7933c
-
SHA1
021795252aa12e46f8e2d5a0eebe47661eb7f5c7
-
SHA256
90742c57c39f84b452f86e7cc0002f082169a051df7c9f8cec31eba35cc5055a
-
SHA512
95e6046fdcb231c2e2872ad6f1592ef132e1ba14469abf6553715b62a20e2189806decc9a8e022ced6d3c12801b95b94db8b51533d4a781881a0446b48a039fc
-
SSDEEP
6144:r4awFL5sjPQHwTUHy0njrmp7fULaP7qBJDP+2IWTU/BAeM1XY7pu:sawFLiPg8kFuP702QCBmh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c02f47aebb8dc7a63f5518616c7933c_JaffaCakes118
Files
-
3c02f47aebb8dc7a63f5518616c7933c_JaffaCakes118.exe windows:5 windows x86 arch:x86
6dcb2bff5f67a334a6259cbd286db371
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
kernel32
GetTickCount
Sleep
CreateToolhelp32Snapshot
Thread32First
Thread32Next
LocalFree
CreateFileW
GetFileSize
ReadFile
GetLastError
WriteFile
GetPriorityClass
OpenSemaphoreW
WaitForSingleObject
CreateProcessA
ReleaseSemaphore
GetModuleFileNameW
CreateProcessW
OpenProcess
CreateEventW
CancelIo
GetOverlappedResult
CreateNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
SetEvent
GetVersionExA
QueryPerformanceCounter
MultiByteToWideChar
TerminateThread
SetThreadPriority
GetExitCodeThread
ResumeThread
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SetEndOfFile
SetFilePointer
GetLocaleInfoW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
CreateFileA
LCMapStringW
WideCharToMultiByte
LCMapStringA
LoadLibraryA
QueryPerformanceFrequency
GetCurrentProcess
SetProcessAffinityMask
GetSystemInfo
CloseHandle
CreateSemaphoreW
HeapFree
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapAlloc
InterlockedIncrement
InterlockedDecrement
ExitThread
GetCurrentThreadId
CreateThread
GetStartupInfoW
RaiseException
RtlUnwind
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
ExitProcess
GetStdHandle
GetModuleFileNameA
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
user32
CharLowerW
GetParent
GetWindowInfo
SetWindowPos
SystemParametersInfoW
GetWindowPlacement
EnumWindows
FindWindowExW
GetWindowThreadProcessId
EnumThreadWindows
IsWindow
PostMessageW
SendMessageW
GetWindowRect
GetKeyState
EnumChildWindows
GetWindowTextW
GetClassNameW
advapi32
InitializeSecurityDescriptor
GetUserNameW
RegSetValueExW
RegCreateKeyExW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorDacl
ws2_32
WSACleanup
gethostbyname
WSAStartup
Sections
.text Size: 286KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ