t:\ses\x86\ship\0\opatchinst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3d4f0591f4ff72735143bd8d1870d2e0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d4f0591f4ff72735143bd8d1870d2e0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3d4f0591f4ff72735143bd8d1870d2e0_JaffaCakes118
-
Size
2.5MB
-
MD5
3d4f0591f4ff72735143bd8d1870d2e0
-
SHA1
674066ed81afcdbe4573ee3a64e2187c666064c9
-
SHA256
70d1ea46a7fc18abd520ed51fa6e5ca3cd59cccfc5c62efebf3bb2bde11ba022
-
SHA512
84c13d61ee7d5216261e0fb7429d812bfa1d373a51528a75135b9cc25ac7105c0575c24869f818827cf20ea26ca3a0c864940385697a26c76f3062d85b8b34bf
-
SSDEEP
49152:6tjvs5U5dtQ05U72zIUWascEefUv5RQBuD1aM:ijvkyIUWn0Bul
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d4f0591f4ff72735143bd8d1870d2e0_JaffaCakes118
Files
-
3d4f0591f4ff72735143bd8d1870d2e0_JaffaCakes118.exe windows:4 windows x86 arch:x86
c261979d0623d9d5245bed4e21fd0160
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenW
FreeLibrary
GetProcAddress
LoadLibraryA
CloseHandle
GetExitCodeProcess
WaitForSingleObject
MultiByteToWideChar
lstrlenA
GetFileSize
CreateFileA
CreateDirectoryA
DeleteFileA
GetTempFileNameA
GetTempPathA
GetFullPathNameA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CopyFileA
MoveFileA
ReadFile
ExpandEnvironmentStringsA
SetEvent
CreateEventA
SetFilePointer
LockResource
LoadResource
FindResourceA
GetSystemDirectoryA
GetUserDefaultLangID
GetSystemDefaultLangID
GetVersionExA
WriteFile
GlobalFree
GlobalAlloc
CompareStringA
GetCurrentProcess
WritePrivateProfileStringA
GetWindowsDirectoryA
SetCurrentDirectoryA
CreateProcessA
GetDiskFreeSpaceExA
GetModuleFileNameA
SetLastError
WideCharToMultiByte
SetFileTime
DosDateTimeToFileTime
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetCPInfo
HeapSize
Sleep
VirtualAlloc
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetFileType
GetCurrentDirectoryA
GetLastError
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
LocalFree
GetFileAttributesA
LocalAlloc
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapReAlloc
RtlUnwind
ExitThread
GetCurrentThreadId
CreateThread
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
oleaut32
SysAllocString
SysAllocStringByteLen
SysStringByteLen
VariantInit
VariantClear
GetErrorInfo
VariantCopy
VariantChangeType
SysStringLen
SysFreeString
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
ole32
CLSIDFromProgID
CoInitialize
CoTaskMemFree
OleRun
CLSIDFromString
CoCreateInstance
user32
SetWindowLongA
SendMessageA
GetWindowLongA
DestroyWindow
PostQuitMessage
DispatchMessageA
EnableMenuItem
EnableWindow
ShowWindow
UpdateWindow
GetDlgItem
PostMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
EndDialog
IsDlgButtonChecked
DialogBoxParamA
CreateDialogParamA
ExitWindowsEx
MessageBoxA
SetWindowTextA
SystemParametersInfoA
GetSystemMenu
CharNextA
PeekMessageA
gdi32
CreateFontIndirectA
Sections
.text Size: 511KB - Virtual size: 510KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ