earthflashsol.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f5bd5c44a6eccf5f5267d2f276fbdbf3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5bd5c44a6eccf5f5267d2f276fbdbf3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f5bd5c44a6eccf5f5267d2f276fbdbf3_JaffaCakes118
-
Size
166KB
-
MD5
f5bd5c44a6eccf5f5267d2f276fbdbf3
-
SHA1
fb2a00f06edd413864368786b7959beb456a1bec
-
SHA256
e5f86bb461811179e1a4e45dc11f78616a73e9e2c471c82244a5693a1db93255
-
SHA512
9ec475423b6b45c5e4a3fea0e3161ec296bb639389aa354a9c59b20feabc08c17489a34d0ca3a97992c705648abc01c125855c7cd8a3bdd9a87ed2564be139fe
-
SSDEEP
3072:npSEyBZks6zJ8XfwBOg3jO8vmk/Y3PFdEHlizroo/f0n8gJltp:p7IZks6zJEfwBOg3S8uk/+PuYzrFXQ8o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5bd5c44a6eccf5f5267d2f276fbdbf3_JaffaCakes118
Files
-
f5bd5c44a6eccf5f5267d2f276fbdbf3_JaffaCakes118.exe windows:4 windows x86 arch:x86
bf2348d4c6583a52da9490e2d6a17acf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcp80
?push_back@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXD@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@V32@D@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@D@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_WI@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?_Throw@std@@YAXABVexception@stdext@@@Z
?_Raise_handler@std@@3P6AXABVexception@stdext@@@ZA
msvcr80
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
_invoke_watson
_controlfp_s
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_wfsopen
memmove
wcscpy
strchr
wcslen
memset
_wcsnicmp
_wfopen
memmove_s
setvbuf
memcmp
_fileno
ftell
memcpy
_errno
fread
feof
_purecall
??_V@YAXPAX@Z
fseek
fwrite
isalpha
fclose
_invalid_parameter_noinfo
??3@YAXPAX@Z
strlen
??2@YAPAXI@Z
_fstat64i32
_strnicmp
kernel32
TlsSetValue
EnterCriticalSection
GetTempFileNameW
GetDiskFreeSpaceExW
GetProcAddress
CopyFileW
TlsAlloc
GetFileAttributesExW
RemoveDirectoryW
MultiByteToWideChar
LeaveCriticalSection
IsDebuggerPresent
FreeLibrary
CloseHandle
GetTickCount
DeleteCriticalSection
WideCharToMultiByte
GetModuleFileNameW
SetThreadPriority
MoveFileW
TlsFree
FindNextFileW
ResumeThread
TlsGetValue
FindClose
GetCurrentThreadId
DeleteFileW
CreateDirectoryW
CreateThread
GetFileAttributesW
GetLastError
GetTempPathW
GetDriveTypeW
LoadLibraryA
InitializeCriticalSection
WaitForSingleObject
GetLongPathNameW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FindFirstFileW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathW
ws2_32
getsockopt
WSACleanup
htonl
WSAResetEvent
sendto
inet_addr
WSAEnumNetworkEvents
setsockopt
connect
ioctlsocket
send
ntohl
WSACreateEvent
WSAGetLastError
recv
recvfrom
htons
socket
WSAStartup
getpeername
getsockname
gethostbyname
closesocket
WSASetEvent
ntohs
WSACloseEvent
WSAWaitForMultipleEvents
bind
WSAEventSelect
listen
accept
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 117KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE