D:\B\T\BuildResults\bin\Release\WebInstaller\RdrServicesUpdater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d647915403eae58d3ed7685078cbaaef.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d647915403eae58d3ed7685078cbaaef
-
Size
19.5MB
-
MD5
d647915403eae58d3ed7685078cbaaef
-
SHA1
28e176959520ceb24544775a22ff435817e21194
-
SHA256
b5562b3ad2c329bed397168e791ff9361b1505e116df3a0a48161d725ff1040b
-
SHA512
a7fa7e3226162342984583bf212ed9bd634702b2c45950491b52f8b98c81d32fb1e63ceb5b2d0ca8657183a27d319fd359751227a30c0d6dfc714f9be15dcb94
-
SSDEEP
393216:emHZI2hMQdB7H/hUfaCVjTPEtOSNVW8ImMyX5/4BaPBr7rt2RqJ:p1M4B7CC2AtjXImNXZ4c5kRq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_d647915403eae58d3ed7685078cbaaef
Files
-
JaffaCakes118_d647915403eae58d3ed7685078cbaaef.exe windows:6 windows x86 arch:x86
3a657d7068d4af97f8db971ae034da0d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
FindResourceExW
GetModuleHandleW
GetProcAddress
LoadResource
LockResource
SizeofResource
FindResourceW
MultiByteToWideChar
WideCharToMultiByte
GetFullPathNameW
WaitForSingleObject
GetCurrentProcessId
ProcessIdToSessionId
HeapAlloc
GetWindowsDirectoryW
lstrcpyW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCommandLineW
DeleteFileW
RemoveDirectoryW
FindResourceA
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
SetFileAttributesW
SetFileTime
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
HeapDestroy
RaiseException
GetLastError
WriteFile
SetFilePointer
ReadFile
CreateFileW
GetCurrentProcess
OpenProcess
CloseHandle
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
user32
PostMessageW
RegisterWindowMessageW
advapi32
SystemFunction036
RegDeleteTreeW
RegSetValueExW
RegCreateKeyExW
CreateProcessWithTokenW
GetTokenInformation
EqualSid
DuplicateTokenEx
AllocateAndInitializeSid
CreateProcessAsUserW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
OpenProcessToken
shell32
CommandLineToArgvW
msvcp140
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE_N_N@Z
?_Fiopen@std@@YAPAU_iobuf@@PBGHH@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z
??0_Lockit@std@@QAE@H@Z
??1_Lockit@std@@QAE@XZ
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
??Bid@locale@std@@QAEIXZ
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
?always_noconv@codecvt_base@std@@QBE_NXZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z
shlwapi
PathFileExistsW
PathCombineW
wtsapi32
WTSEnumerateSessionsW
WTSFreeMemory
vcruntime140
__current_exception_context
__current_exception
memcmp
_except_handler4_common
memmove
__std_terminate
__CxxFrameHandler3
memset
_CxxThrowException
memcpy
wcsstr
__std_exception_copy
__std_exception_destroy
api-ms-win-crt-heap-l1-1-0
_callnewh
_set_new_mode
malloc
free
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo
_invalid_parameter_noinfo_noreturn
_errno
_controlfp_s
terminate
_register_thread_local_exe_atexit_callback
_c_exit
_exit
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
_seh_filter_exe
_set_app_type
exit
_get_narrow_winmain_command_line
_initterm
_initterm_e
api-ms-win-crt-stdio-l1-1-0
fwrite
_set_fmode
_ftelli64
ftell
fsetpos
fread
__p__commode
fputc
fseek
fopen
fgetpos
fgetc
_fseeki64
fflush
fclose
_get_stream_buffer_pointers
ferror
_wfopen
setvbuf
ungetc
api-ms-win-crt-filesystem-l1-1-0
_lock_file
_unlock_file
_wchdir
api-ms-win-crt-string-l1-1-0
_wcsicmp
wcsnlen
wcscat_s
isspace
isxdigit
isdigit
strlen
wcsncpy
_wcslwr_s
wmemcpy_s
wcscpy_s
api-ms-win-crt-convert-l1-1-0
_wtoi
api-ms-win-crt-utility-l1-1-0
rand
srand
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-environment-l1-1-0
_wgetcwd
api-ms-win-crt-math-l1-1-0
pow
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19.0MB - Virtual size: 19.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 400KB - Virtual size: 992KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ