ie4uinit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fc1a91816039a9927b5be0f85f7607b5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc1a91816039a9927b5be0f85f7607b5_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc1a91816039a9927b5be0f85f7607b5_JaffaCakes118
-
Size
341KB
-
MD5
fc1a91816039a9927b5be0f85f7607b5
-
SHA1
4d21f0f5a698541728cb916b44252788d1f42b35
-
SHA256
e690eb7331d409645246598a155434feb2fef1668580994de93190eec3ec51b4
-
SHA512
cd43eaa6eaac4f2caca6beec86219d9046d45b21b8d77ad5f93456cea48ace4674ef83da19da9be515cedeb26049f337c4460e52d880e3f37fc8b0574ccd2d81
-
SSDEEP
6144:6DInjNh5zcO/U2yRD0M2YcAzvIH/dkAN3bw/QfAoRI:6DG5zT81eMrIKQfAoR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc1a91816039a9927b5be0f85f7607b5_JaffaCakes118
Files
-
fc1a91816039a9927b5be0f85f7607b5_JaffaCakes118.exe windows:6 windows x86 arch:x86
db7b81b02506d126d2a627b8e0d75a13
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegEnumValueW
RegOpenKeyExW
RegSetValueW
RegDeleteKeyW
kernel32
GetProcAddress
LoadLibraryW
lstrlenW
GetLastError
GetEnvironmentVariableW
GetVersion
GetModuleHandleW
SetErrorMode
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindClose
FindNextFileW
FindFirstFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
lstrcmpW
FindFirstFileExW
GetShortPathNameW
GetSystemDefaultUILanguage
CreateDirectoryW
LocalFree
LocalAlloc
CloseHandle
CreateFileW
GetTickCount
Sleep
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetPrivateProfileStringW
GetNativeSystemInfo
SetLastError
LoadResource
FindResourceExW
FreeLibrary
GetSystemDirectoryW
GetVersionExW
GetModuleFileNameW
LoadLibraryExW
MapViewOfFile
CreateFileMappingW
GetLocaleInfoW
GetModuleHandleA
UnmapViewOfFile
GetUserDefaultUILanguage
FindResourceW
SearchPathW
SetUnhandledExceptionFilter
RtlUnwind
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
user32
MessageBoxW
LoadStringW
PostMessageW
GetMenuItemInfoW
GetMenuItemCount
DestroyMenu
CreatePopupMenu
SendInput
GetCursorPos
SystemParametersInfoW
PostQuitMessage
SetWinEventHook
KillTimer
DispatchMessageW
GetMessageW
SetTimer
UnhookWinEvent
BlockInput
msvcrt
memcpy
_vsnwprintf
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
_time64
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
wcsncmp
_wcsicmp
_wcsnicmp
bsearch
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
shell32
ord526
SHChangeNotify
SHGetSpecialFolderLocation
ord155
SHGetDesktopFolder
ord190
SHGetSpecialFolderPathW
SHBindToParent
SHParseDisplayName
SHSetLocalizedName
ord165
ole32
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitializeEx
advpack
RunSetupCommandW
ExecuteCabW
RegRestoreAllW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
SHRegGetValueW
StrCmpIW
SHDeleteKeyW
ord225
PathAddExtensionW
PathRemoveBlanksW
SHDeleteValueW
SHSetValueW
PathAppendW
PathRemoveFileSpecW
SHCopyKeyW
StrCmpNIW
PathFileExistsW
PathCombineW
PathAddBackslashW
ord437
ord158
StrStrIW
SHRegSetUSValueW
SHGetValueW
PathRemoveExtensionW
iertutil
ord33
ord37
ord654
ord650
oleacc
AccessibleObjectFromEvent
oleaut32
SysFreeString
VariantClear
Sections
.text Size: 149KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.tdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE