UI0Detect.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e94e51ac8d5a7352432bdd6c85ce7f3a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e94e51ac8d5a7352432bdd6c85ce7f3a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e94e51ac8d5a7352432bdd6c85ce7f3a_JaffaCakes118
-
Size
439KB
-
MD5
e94e51ac8d5a7352432bdd6c85ce7f3a
-
SHA1
e399dcacd2caffbe441f8a15158c29aaad7bf873
-
SHA256
f7cd8293f3d6636e53793802eb9e46f886b5052531ae8c892b9ac175908cb2c2
-
SHA512
b04e1181aa5dae6eae1a430f4e6648ab0cd202718c16598e62257ed16751b406a4fc302234e1546fc0bd710493373d230e1756324e6de1332711630dea1ea486
-
SSDEEP
12288:b7bMMYMM8K7Hjpvza5uFi/LH1u1qPUMJdJOVPh397S:b3MMYMML9GpVKKdC53
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e94e51ac8d5a7352432bdd6c85ce7f3a_JaffaCakes118
Files
-
e94e51ac8d5a7352432bdd6c85ce7f3a_JaffaCakes118.exe windows:6 windows x64 arch:x64
fa9004a0c2db80200c505e2349a9bc4f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
CheckTokenMembership
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterEventSourceW
ReportEventW
RegisterServiceCtrlHandlerW
DeregisterEventSource
ImpersonateLoggedOnUser
CreateProcessAsUserW
RevertToSelf
kernel32
HeapAlloc
GetProcessHeap
HeapFree
GetLastError
Sleep
CreateFileMappingW
MapViewOfFile
DuplicateHandle
GetCurrentProcess
UnmapViewOfFile
CloseHandle
GetSystemTimeAsFileTime
CompareStringW
CompareFileTime
K32EnumProcessModules
K32GetModuleInformation
K32GetModuleBaseNameW
lstrcmpW
GetCurrentProcessId
OpenProcess
K32GetModuleFileNameExW
SetLastError
GetTickCount
GetCurrentThreadId
GetModuleHandleW
FormatMessageW
LocalFree
CreateEventW
FreeLibrary
GetProcAddress
LoadLibraryExA
DelayLoadFailureHook
HeapSetInformation
lstrlenW
TerminateProcess
GetStartupInfoW
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
gdi32
CreateSolidBrush
user32
GetWindowThreadProcessId
PostMessageW
GetWindow
RegisterWindowMessageW
SetWindowLongPtrW
RegisterShellHookWindow
SetTimer
EnumWindows
PostQuitMessage
GetLastInputInfo
IsWindow
DestroyWindow
MoveWindow
GetSystemMetrics
KillTimer
DefWindowProcW
LoadCursorW
RegisterClassW
CreateWindowExW
GetWindowTextW
SystemParametersInfoW
SetShellWindow
GetProcessWindowStation
GetThreadDesktop
GetUserObjectInformationW
GetMessageW
DispatchMessageW
UnregisterClassW
LoadStringW
LoadIconW
DestroyIcon
FlashWindowEx
GetWindowRect
GetWindowInfo
GetClassNameW
GetClassLongPtrW
GetWindowLongPtrW
FindWindowW
ShowWindow
GetWindowTextLengthW
SendMessageW
GetClassLongW
SetTaskmanWindow
msvcrt
_vsnwprintf
wcsrchr
_atoi64
__getmainargs
__C_specific_handler
_exit
_ismbblead
_cexit
memset
exit
?terminate@@YAXXZ
__set_app_type
_fmode
__setusermatherr
_commode
_amsg_exit
_initterm
_XcptFilter
_acmdln
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
WinSqmAddToAverageDWORD
WinSqmIncrementDWORD
WinSqmAddToStream
WinSqmEndSession
WinSqmSetDWORD
WinSqmSetString
WinSqmStartSession
WinSqmIsOptedIn
RtlFreeSid
RtlAllocateAndInitializeSid
RtlCaptureContext
wtsapi32
WTSDisconnectSession
WTSRegisterSessionNotification
WTSUnRegisterSessionNotification
WTSQueryUserToken
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
winsta
WinStationRevertFromServicesSession
WinStationSwitchToServicesSession
WinStationGetSessionIds
shell32
SHGetFolderPathW
shlwapi
ord354
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 400KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ