CLIPSRV.pdb
Behavioral task
behavioral1
Sample
4687a97b99276d11e457dbc3c402605c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
4687a97b99276d11e457dbc3c402605c_JaffaCakes118
-
Size
140KB
-
MD5
4687a97b99276d11e457dbc3c402605c
-
SHA1
5e3460515b1cb19e6e19e742d773c3bc8770b2f8
-
SHA256
d14b2b9c4c1549a033a31119f4d96225c07247c50bb35fdb35c01e437155eaec
-
SHA512
a1b2fcc9a92812adbd67d48e3558821945a20970c706322158f738f523b5d789afe3b0f7f5476f68df36a37290bb5e27c953133915c3bfd230639fc078e2ef39
-
SSDEEP
3072:liKgrxmxrY3f3Rjzy0OSCHwk6o0nDXkwAruoCEm1a40TVJ:liKgrxmxU3f3PCHk/XLffIJ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4687a97b99276d11e457dbc3c402605c_JaffaCakes118
Files
-
4687a97b99276d11e457dbc3c402605c_JaffaCakes118.exe .vbs windows:5 windows x86 arch:x86 polyglot
39b39bbb163f0884f72ad82728d73a76
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
nddeapi
ord501
ord509
msvcrt
_XcptFilter
_cexit
exit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_exit
_c_exit
sprintf
_controlfp
advapi32
RegOpenKeyExA
GetTokenInformation
IsValidSecurityDescriptor
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorLength
MakeSelfRelativeSD
OpenThreadToken
OpenProcessToken
RegSetValueExA
RegEnumValueA
RegDeleteValueW
GetSecurityDescriptorDacl
GetAce
SetFileSecurityW
RegSetValueExW
RevertToSelf
RegDeleteValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
RegCreateKeyExA
RegCloseKey
kernel32
CreateFileW
DeleteFileW
GetLastError
GetComputerNameA
lstrcmpW
MultiByteToWideChar
LocalAlloc
lstrlenW
CreateFileA
GetTickCount
GetWindowsDirectoryA
lstrlenA
lstrcpyA
lstrcmpA
lstrcpyW
WriteFile
GlobalFree
GlobalHandle
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalSize
DeleteFileA
lstrcatA
GlobalReAlloc
GetCurrentProcess
GetCurrentThread
WideCharToMultiByte
SetUnhandledExceptionFilter
LocalFree
lstrcmpiA
GetModuleHandleA
CloseHandle
CreateMutexA
WaitForSingleObject
ReleaseMutex
ReadFile
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetFilePointer
gdi32
SetMapMode
SaveDC
GetEnhMetaFileHeader
PatBlt
SelectObject
CreateBitmap
CreateCompatibleDC
CreateBitmapIndirect
SetMetaFileBitsEx
CreatePalette
SetEnhMetaFileBits
GetDIBits
RealizePalette
SelectPalette
CreateDIBitmap
SetStretchBltMode
RestoreDC
PlayMetaFile
SetViewportOrgEx
PlayEnhMetaFile
SetWindowExtEx
GetPaletteEntries
StretchBlt
SetViewportExtEx
GetStockObject
CreateFontA
DeleteObject
DeleteDC
GetBitmapBits
GetEnhMetaFileBits
GetObjectA
GetMetaFileBitsEx
user32
GetDC
ReleaseDC
FillRect
DrawTextA
DrawTextW
LoadCursorA
SetCursor
ShowCursor
EnumClipboardFormats
GetClipboardFormatNameW
LoadStringW
SendMessageA
RegisterClipboardFormatA
PostQuitMessage
DdeUninitialize
DdeNameService
SetClipboardData
DefWindowProcA
DdeAddData
DdeUnaccessData
DdeFreeDataHandle
DdeAccessData
DdeCreateDataHandle
RegisterClipboardFormatW
OpenClipboard
CloseClipboard
DdeInitializeA
CreateWindowExA
SetProcessWindowStation
OpenWindowStationA
RegisterClassA
LoadIconA
UnregisterClassA
DispatchMessageA
TranslateMessage
GetMessageA
DdeKeepStringHandle
DdeCmpStringHandles
DdeFreeStringHandle
DdeQueryStringA
DdePostAdvise
DdeImpersonateClient
DdeCreateStringHandleA
DdeCreateStringHandleW
wsprintfA
DdeGetLastError
DdeGetData
wsprintfW
EmptyClipboard
CountClipboardFormats
IsClipboardFormatAvailable
GetClipboardData
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE