\\EXSYMBOLS\SYMBOLS\INTERNAL\SYM7638.1\ntx\rtl\USA\exe\ESE\ESEUTIL\ESEUTIL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3f285a53bcf040346b3d62805244305f_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3f285a53bcf040346b3d62805244305f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3f285a53bcf040346b3d62805244305f_JaffaCakes118
-
Size
65KB
-
MD5
3f285a53bcf040346b3d62805244305f
-
SHA1
dc6c3d552ca41bb65f79cf687417d7d65814fee9
-
SHA256
1180325894771cf0ba2d510bb292d76c0683902bf8c081e67d9d9cc8c3675029
-
SHA512
b65e0954d8ec5546d01a744d2954443739c0f58c85b2820503ce02b6b2616003c27d6d02edd4a348ca0a0c5184e1a00732dbb8b9217fede9ae61cfe536823dee
-
SSDEEP
1536:BZ7g3ARy4W/LsMOSSGVmt+naIq3Z6oqtWTabLXMePjIkZq:ng3ARy4W/LPFSGV6qaXzODC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f285a53bcf040346b3d62805244305f_JaffaCakes118
Files
-
3f285a53bcf040346b3d62805244305f_JaffaCakes118.exe windows:4 windows x86 arch:x86
d65a53dbce7d6f0005b5eb747884e83d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ese
JetDetachDatabase@8
JetBeginSession@16
JetCompact@24
JetGetSystemParameter@24
JetSetSystemParameter@20
JetTerm2@8
JetInit2@8
JetInit@4
JetGetDatabaseFileInfo@16
JetEndSession@8
JetMove@16
JetCloseTable@8
JetGetTableColumnInfo@24
JetOpenTable@28
JetTerm@4
JetCloseDatabase@12
JetOpenDatabase@20
JetAttachDatabaseWithStreaming@24
JetRestore2@12
JetBackup@12
JetRetrieveColumns@16
JetDBUtilities@4
kernel32
Sleep
InterlockedIncrement
IsProcessorFeaturePresent
GetQueuedCompletionStatus
SetThreadPriorityBoost
GetCurrentThread
VirtualFree
WaitForSingleObjectEx
CreateEventW
VirtualAlloc
GetTickCount
CreateThread
CreateIoCompletionPort
CloseHandle
CreateFileW
GetOverlappedResult
WriteFile
SetEndOfFile
SetFilePointer
LocalFree
FormatMessageW
GetProcAddress
LoadLibraryExA
FormatMessageA
GetModuleHandleA
CopyFileA
MoveFileA
DeleteFileA
MoveFileExA
FindClose
FindFirstFileA
GetCurrentProcess
MultiByteToWideChar
LocalAlloc
LoadLibraryA
FreeLibrary
GetComputerNameA
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
TerminateProcess
ReadFile
GetLastError
SetEvent
GetFileSize
user32
MessageBoxA
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
msvcrt
wprintf
fwprintf
_iob
iswascii
wcslen
_mbsnbcpy
printf
exit
sprintf
_getch
_cprintf
_makepath
_splitpath
_strcmpi
_fullpath
strchr
wcscpy
_wctime
swprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
atol
sscanf
_stricmp
atoi
_strupr
_c_exit
_exit
_XcptFilter
_cexit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_except_handler3
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ