d:\nightly\powerword\cbupdate\sup\rebug\sup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
44c702dc0a83cfb31a97e458d419501a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44c702dc0a83cfb31a97e458d419501a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
44c702dc0a83cfb31a97e458d419501a_JaffaCakes118
-
Size
668KB
-
MD5
44c702dc0a83cfb31a97e458d419501a
-
SHA1
c5fc90ac7b2d7fca65789dc794d23230b8021d14
-
SHA256
bc24ef4fbec34d2275f296a206287c049f419f175ae086b652c1b142819ecd15
-
SHA512
3aefeda688c0ebc05dcc34bf5d9d580c7b455d7bc630e3e0cf53403572deca313ed5174de26120aef5b481f4703fa1f0b25e6f52281874d3352d466b002b4ed4
-
SSDEEP
12288:CsmYtasJkCCekl4p7UqVC5RKbNm9+QRDv2EsNxDIBuOFe7/uT:FFmCZkyZC5RKbNnSDv29tIoOFdT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44c702dc0a83cfb31a97e458d419501a_JaffaCakes118
Files
-
44c702dc0a83cfb31a97e458d419501a_JaffaCakes118.exe windows:4 windows x86 arch:x86
be8f85d35ae389548ee7e5708733f879
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
timeGetTime
ws2_32
getsockopt
closesocket
socket
bind
recvfrom
sendto
recv
send
select
__WSAFDIsSet
inet_ntoa
WSAGetLastError
WSASetLastError
gethostbyname
htons
ntohs
listen
accept
WSAStartup
WSACleanup
ioctlsocket
connect
inet_addr
getsockname
setsockopt
psapi
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
upcheck
??1Cupcheck@@UAE@XZ
?Start@Cupcheck@@QAEXXZ
??0Cupcheck@@QAE@PAPAUHWND__@@H@Z
kernel32
SetEnvironmentVariableW
CreateFileW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
GetTimeZoneInformation
CreateFileA
SetStdHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapSize
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetOEMCP
GetACP
HeapDestroy
TlsFree
TlsSetValue
GetCurrentDirectoryA
ExitProcess
InterlockedDecrement
WaitForSingleObject
SetEvent
InitializeCriticalSection
TerminateThread
Sleep
LeaveCriticalSection
CreateSemaphoreA
ReleaseSemaphore
EnterCriticalSection
CreateEventW
DeleteCriticalSection
CloseHandle
GetModuleFileNameW
OpenProcess
GetCurrentProcessId
lstrlenW
GetCurrentProcess
FlushInstructionCache
RaiseException
SetLastError
GetCurrentThreadId
SleepEx
GetLastError
ExpandEnvironmentStringsW
CreateMutexW
GetTickCount
GetExitCodeThread
WaitForMultipleObjects
DuplicateHandle
ReleaseMutex
FreeLibrary
LoadLibraryW
GetProcAddress
FormatMessageW
PeekNamedPipe
ReadFile
GetStdHandle
GetFileType
MultiByteToWideChar
WideCharToMultiByte
LocalFree
InterlockedIncrement
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
GetVersionExA
TlsAlloc
TlsGetValue
GetStartupInfoA
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
WriteFile
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetFileInformationByHandle
SetFilePointer
GetSystemTimeAsFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
HeapReAlloc
CreateDirectoryW
CreateDirectoryA
GetModuleHandleA
GetFullPathNameA
QueryPerformanceCounter
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CreateThread
ExitThread
GetStartupInfoW
HeapCreate
user32
CallWindowProcW
EndDialog
FindWindowW
SetWindowLongW
DialogBoxParamW
LoadIconW
TranslateMessage
TranslateAcceleratorW
GetMessageW
GetWindowLongW
LoadStringW
IsWindow
IsWindowVisible
DestroyWindow
DispatchMessageW
SendMessageW
DefWindowProcW
CreateWindowExW
RegisterClassExW
LoadCursorW
PostMessageW
GetClassInfoExW
UnregisterClassA
LoadAcceleratorsW
PostQuitMessage
ole32
CoInitialize
shell32
ShellExecuteW
SHGetFolderPathW
oleaut32
VariantClear
SysAllocStringLen
SysStringLen
SysAllocString
SysFreeString
Sections
.text Size: 276KB - Virtual size: 273KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE