C:\work3\miktex-2.7-nmake\binlib\copystart_admin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
425c5779edf7dee1f3178c8676df70f3_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
425c5779edf7dee1f3178c8676df70f3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
425c5779edf7dee1f3178c8676df70f3_JaffaCakes118
-
Size
1.2MB
-
MD5
425c5779edf7dee1f3178c8676df70f3
-
SHA1
cca65da0529f93f0f1a6987e2e44572c513df3a4
-
SHA256
6f3ddb219d7cb0576ddfcfac26caf2ea546704c58d61a8a8be307718cb124494
-
SHA512
c2a1d4adee0768452866ed76f3c688b30f2d6f61dfcf860a53d9c1c4850300fb17fe7d9d789f95e02b8a0bf123770622dba2383499d552a000f1bb4771c7b6a6
-
SSDEEP
24576:TzvRKZbwKAGlBAG3NUmPaNqtceqU7XwdmntcM9TUz8rw:5KnAS9DgawdmtcM9TC8k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 425c5779edf7dee1f3178c8676df70f3_JaffaCakes118
Files
-
425c5779edf7dee1f3178c8676df70f3_JaffaCakes118.exe windows:5 windows x86 arch:x86
190940efdf20306705059ea0a948b192
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
AssocQueryKeyA
ord1
kernel32
RemoveDirectoryA
SetFileAttributesA
GetFileSize
CreateFileA
DeleteFileA
MoveFileA
CopyFileA
LocalFree
GetModuleHandleA
SetLastError
Sleep
FormatMessageA
DebugBreak
GetSystemInfo
GetProcAddress
GetVersionExA
GetTempPathA
MoveFileExA
GetCurrentProcess
GetDriveTypeA
MultiByteToWideChar
GlobalFree
GetModuleFileNameA
GetProfileStringA
GlobalAlloc
GetCurrentThread
CreateDirectoryA
InterlockedIncrement
InterlockedDecrement
OutputDebugStringA
WaitForSingleObject
GetExitCodeProcess
SearchPathA
CreateProcessA
GetLastError
CreatePipe
DuplicateHandle
UnmapViewOfFile
FlushViewOfFile
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
LoadLibraryA
FreeLibrary
GetCurrentThreadId
SetEvent
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateEventA
FindNextFileW
FindFirstFileW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
FlushFileBuffers
SetCurrentDirectoryA
GetCurrentDirectoryA
GetFullPathNameA
HeapSize
SetEnvironmentVariableW
SetEnvironmentVariableA
GetProcessHeap
SetEndOfFile
FindFirstFileA
FindClose
GetFileAttributesA
SetFileTime
WriteConsoleW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
CloseHandle
GetTempFileNameA
WideCharToMultiByte
GetWindowsDirectoryA
GetVersion
WriteConsoleA
GetConsoleOutputCP
GetStdHandle
InterlockedExchange
InterlockedCompareExchange
GetLocaleInfoA
ExpandEnvironmentStringsA
RaiseException
RtlUnwind
GetCommandLineA
GetStartupInfoA
HeapFree
GetModuleHandleW
ExitProcess
HeapAlloc
HeapReAlloc
SetStdHandle
GetFileType
HeapValidate
GetSystemTimeAsFileTime
ExitThread
CreateThread
LCMapStringA
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetTimeFormatA
GetDateFormatA
CompareStringA
CompareStringW
GetStringTypeW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetACP
GetOEMCP
IsValidCodePage
FatalAppExitA
VirtualAlloc
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
ReadFile
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
SetFilePointer
user32
MessageBoxA
SendMessageTimeoutA
GetSystemMetrics
IsWindow
winspool.drv
EnumPrintersA
shell32
ShellExecuteExA
ole32
CoUninitialize
CoInitializeEx
oleaut32
SysFreeString
advapi32
FreeSid
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
SetEntriesInAclA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenThreadToken
AllocateAndInitializeSid
EqualSid
RegOpenKeyExW
OpenProcessToken
GetTokenInformation
RegQueryValueExA
RegCloseKey
Exports
Exports
?OnThrowStdException@Debug@MiKTeX@@YAXXZ
_DllGetVersion@4
Sections
.text Size: 1007KB - Virtual size: 1007KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE