C:\Users\Radford\Downloads\RadScript\RadScript Loader\ChromeInstaller\x64\Release\ChromeInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d23e5cfbd4e172944ea081908cb81620_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
d23e5cfbd4e172944ea081908cb81620_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
d23e5cfbd4e172944ea081908cb81620_JaffaCakes118
-
Size
3.4MB
-
MD5
d23e5cfbd4e172944ea081908cb81620
-
SHA1
2f0caa22e7e6b89b2f5e1b0d3de179ffab39b7ce
-
SHA256
00deda40d87f6c536dbab9de68e8b5da5bd6a973fe4e360ef85e7d2fbe937ae7
-
SHA512
b2aa8b8ef4181b6d70e91cd66d150201225e57070ab421d5ff01999d48ebe7b659c8f08aa048fe28e1731d94492d3f0fec8e87348e7b3fd56579eb7ea64b54af
-
SSDEEP
49152:lGtlqWyIU6iZf1QeeZyiPvP+DwrMD+uO3vRXQ9XORtxW/yeCKc3XKNPnqTFtZiP/:Y+Z/iPvP0Y3e9aQcnN/eO1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d23e5cfbd4e172944ea081908cb81620_JaffaCakes118
Files
-
d23e5cfbd4e172944ea081908cb81620_JaffaCakes118.exe windows:6 windows x64 arch:x64
24a7f6b0c7642e2325528b798ae96412
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
inet_pton
getnameinfo
__WSAFDIsSet
shutdown
select
gethostname
sendto
recvfrom
ntohl
freeaddrinfo
getaddrinfo
ioctlsocket
listen
htonl
socket
send
recv
closesocket
accept
WSACleanup
WSAStartup
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSASetLastError
WSAGetLastError
wldap32
ord60
ord45
ord211
ord50
ord46
ord41
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord22
ord143
crypt32
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertAddCertificateContextToStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
advapi32
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
GetLengthSid
ConvertSidToStringSidW
GetTokenInformation
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CopySid
IsValidSid
OpenProcessToken
kernel32
GetDateFormatW
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetCommandLineW
GetCommandLineA
WriteFile
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
DeleteFileW
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
GetTimeFormatW
FlushFileBuffers
SetConsoleCtrlHandler
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
WriteConsoleW
GetEnvironmentVariableW
HeapFree
SetConsoleMode
InitializeCriticalSectionEx
HeapSize
Sleep
GetLastError
HeapReAlloc
CloseHandle
RaiseException
HeapAlloc
DecodePointer
HeapDestroy
LocalFree
DeleteCriticalSection
GetProcessHeap
WideCharToMultiByte
GetConsoleWindow
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
GetThreadTimes
FormatMessageA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SleepEx
VerSetConditionMask
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
CreateFileA
GetFileSizeEx
SetFilePointerEx
ExitThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
CreateFileW
GetModuleHandleExW
ExitProcess
VirtualQuery
GetSystemInfo
RtlPcToFileHeader
RtlUnwindEx
WaitForSingleObject
LoadLibraryW
InterlockedPushEntrySList
ReadConsoleA
FormatMessageW
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
FindFirstFileW
GetSystemTime
SystemTimeToFileTime
RtlUnwind
GetCurrentProcess
MultiByteToWideChar
GetCurrentThreadId
EncodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
SetEvent
ResetEvent
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
CreateThread
FreeLibraryAndExitThread
GetModuleFileNameW
LoadLibraryExW
VirtualAlloc
VirtualProtect
user32
ShowWindow
MessageBoxW
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
shell32
ShellExecuteA
ShellExecuteW
userenv
UnloadUserProfile
rpcrt4
RpcStringFreeA
UuidToStringA
UuidCreate
urlmon
URLDownloadToFileW
bcrypt
BCryptGenRandom
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 807KB - Virtual size: 806KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ