powershell.pdb
Static task
static1
General
-
Target
JaffaCakes118_aeacd6bfb480546d0ee3e14f0bb46f8c
-
Size
816KB
-
MD5
aeacd6bfb480546d0ee3e14f0bb46f8c
-
SHA1
05574783017260e4d3dc0ca831161b5cabf51c30
-
SHA256
3b6c6c2a764d8fef59455935fa43ac30fe7db543d13f6119a62c5b14faa87325
-
SHA512
6aa7e58beb9923690918de0c3634bc6ec170dff647fe5a381604b3e28c6f74ff5e12424175acecee21bf419f66060fd562d48a47ba72703c39e2b4aa0906e6f9
-
SSDEEP
24576:BJW2KjJ4Td3kJnbsPhnzqpKZdhRcloe4Mmz5:BInJ4Td3mbsPhnepYhRclkd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_aeacd6bfb480546d0ee3e14f0bb46f8c
Files
-
JaffaCakes118_aeacd6bfb480546d0ee3e14f0bb46f8c.exe windows:10 windows x86 arch:x86
d1a922c94a1f407cb2bbcad033c8ed7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
?terminate@@YAXXZ
_onexit
__dllonexit
_unlock
_lock
??1type_info@@UAE@XZ
_initterm
_controlfp
_except_handler4_common
_vsnwprintf
_wcsicmp
_wcsnicmp
bsearch
memcpy
_wfopen
_itow_s
wcstoul
??0exception@@QAE@ABQBD@Z
wcschr
memmove_s
__uncaught_exception
__setusermatherr
__p__fmode
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
_CxxThrowException
_callnewh
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
malloc
wcsncmp
wcsrchr
free
_purecall
memcpy_s
__CxxFrameHandler3
fclose
memcmp
memset
atl
ord30
kernel32
GetModuleFileNameW
GetModuleHandleExW
LoadLibraryExW
MapViewOfFile
CreateFileMappingW
FreeLibrary
LoadResource
FindResourceExW
UnmapViewOfFile
GetVersionExW
GetProcAddress
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
SetErrorMode
VerifyVersionInfoW
GetTickCount
GetSystemTimeAsFileTime
EnterCriticalSection
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoW
GetStartupInfoW
SleepConditionVariableSRW
FindFirstFileW
LeaveCriticalSection
CompareStringW
SetConsoleTitleW
SetLastError
VerSetConditionMask
GetCurrentProcess
GetStdHandle
WriteFile
WakeAllConditionVariable
ExpandEnvironmentStringsW
LocalFree
WriteConsoleW
AcquireSRWLockExclusive
SetThreadUILanguage
GetCurrentThreadId
GetModuleHandleW
FindClose
CreateFileW
GetFileAttributesW
FormatMessageW
ReleaseSRWLockExclusive
Sleep
GetLastError
CloseHandle
IsWow64Process
GetFileType
oleaut32
VariantClear
SysFreeString
SysAllocString
SafeArrayPutElement
SysStringLen
SafeArrayCreate
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegGetValueW
RegEnumKeyExW
ole32
CoInitializeEx
PropVariantClear
CoInitialize
CoTaskMemAlloc
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 400KB - Virtual size: 992KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ