c:\Must\A\Continuations.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3dab2b07b04a217813a365913fc55c77_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3dab2b07b04a217813a365913fc55c77_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3dab2b07b04a217813a365913fc55c77_JaffaCakes118
-
Size
379KB
-
MD5
3dab2b07b04a217813a365913fc55c77
-
SHA1
885bcddbd93a5311f60281134f250086b9db1c34
-
SHA256
dc15daddbd41fb23819ed8db6894d6b391e4ec0bf78f80596eede8e76d930fde
-
SHA512
f7182686f00740a4fcb34501afc7ba87bb02aaedd0df990e3fb4bcf55c12a83efd908257c0e5a2231babf66cf55185a2a0fae0ac87fd294d1f30c2b85139efd4
-
SSDEEP
6144:7NyLOMQmxxRtFpBJSTetrIti16mXXZjULrzqIsSH+CM48e+p6h2LQIB7Mxc:76omrRHpCTeOU16mHZjaPs6+Cj+u5c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3dab2b07b04a217813a365913fc55c77_JaffaCakes118
Files
-
3dab2b07b04a217813a365913fc55c77_JaffaCakes118.exe windows:4 windows x86 arch:x86
fa9834ea0f40c81473116d26f960f8a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
PDB Paths
Imports
kernel32
GetStdHandle
SetHandleCount
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
ExitProcess
GetCommandLineA
lstrcpynA
CreateFileA
OutputDebugStringA
OutputDebugStringW
GetSystemDirectoryW
lstrcpyW
SetCurrentDirectoryW
MulDiv
CopyFileW
LocalFree
LocalAlloc
GetLastError
GetDiskFreeSpaceExW
GetWindowsDirectoryW
GetSystemTime
VerifyVersionInfoW
FreeLibrary
GetWindowsDirectoryA
DeleteFileW
GetFileSize
GetDriveTypeW
GetLogicalDrives
RemoveDirectoryW
SystemTimeToFileTime
GetCurrentDirectoryW
SetFileTime
LocalFileTimeToFileTime
SetThreadLocale
GetThreadLocale
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
RaiseException
WaitForMultipleObjects
CreateMutexA
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
Sleep
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
MoveFileW
MoveFileA
CreateFileW
GetStartupInfoA
CreateDirectoryA
SetFileAttributesW
SetLastError
FindNextFileW
GetDiskFreeSpaceW
GetModuleHandleA
GetDiskFreeSpaceA
CreateThread
FindFirstFileW
FileTimeToSystemTime
FindClose
SetFilePointer
RemoveDirectoryA
WriteFile
ReadFile
FlushFileBuffers
GetFileAttributesW
ExpandEnvironmentStringsW
SetErrorMode
CloseHandle
GetModuleHandleW
FindResourceA
SizeofResource
GetModuleFileNameA
lstrcpyA
lstrcatA
DisableThreadLibraryCalls
EnterCriticalSection
LeaveCriticalSection
lstrcmpiA
IsDBCSLeadByte
lstrlenA
DeleteCriticalSection
InitializeCriticalSection
lstrlenW
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetVersionExA
SetFileAttributesA
FreeEnvironmentStringsA
HeapFree
GetProcessHeap
HeapAlloc
GetSystemDefaultLCID
CreateEventA
WaitForSingleObject
ResetEvent
DeviceIoControl
GetEnvironmentStrings
CompareStringA
GetDriveTypeA
WideCharToMultiByte
HeapDestroy
HeapCreate
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetACP
GetCPInfo
HeapReAlloc
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
SetEvent
SetStdHandle
GetStartupInfoW
GetSystemTimes
CreateDirectoryW
ExitThread
user32
CharLowerW
UpdateWindow
wsprintfW
GetWindowModuleFileNameA
IsChild
GetClientRect
CreateWindowExW
SetCursor
LoadCursorW
SetDlgItemTextW
CharNextA
CharPrevA
wsprintfA
LoadImageW
LoadImageA
ExitWindowsEx
advapi32
AllocateAndInitializeSid
AdjustTokenPrivileges
RegDeleteKeyA
RegEnumKeyExA
EqualSid
FreeSid
OpenProcessToken
LookupPrivilegeValueW
ControlService
OpenServiceA
CloseServiceHandle
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegEnumValueA
RegQueryValueExA
QueryServiceStatus
StartServiceA
RegOpenKeyExW
shell32
SHGetFileInfoW
SHGetFileInfoA
ole32
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoInitializeEx
msvcrt
printf
memset
malloc
towupper
wcscat
wcscpy
wcslen
wcsncpy
wcscmp
wcsrchr
wcsncmp
wcschr
atoi
shlwapi
PathFindExtensionW
PathAddBackslashW
SHDeleteValueW
StrCmpIW
PathAddBackslashA
SHDeleteKeyW
setupapi
SetupCloseInfFile
Sections
.text Size: 289KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE