C:\CodeBases\isdev\redist\language independent\i386\SetupSuite.pdb
Static task
static1
Behavioral task
behavioral1
Sample
109540430ee68c2c07a598da097a2cfe_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
109540430ee68c2c07a598da097a2cfe_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
109540430ee68c2c07a598da097a2cfe_JaffaCakes118
-
Size
1.3MB
-
MD5
109540430ee68c2c07a598da097a2cfe
-
SHA1
4474bee3a3b981a3f2cb5eef4a6eea290bb49ec9
-
SHA256
06f6c490d4014b374d1bb841dfe2b87f7913f38ddf065e891d4574d7b345870a
-
SHA512
e9718a093e84c864db06be50765ef67d96584da1fa437d7084020168f3aeea00c11326047648faa6833d764f70ae65cc7c4d840651af9929e65e123807094b23
-
SSDEEP
24576:LBJUFUoVPv+6RmpNUsL5lu6Sqn44TzEFLx7c1DcBTO19LUPoWap28:fUlVPmyQLa6Sqn44Tec2BTO19LUPoWaX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 109540430ee68c2c07a598da097a2cfe_JaffaCakes118
Files
-
109540430ee68c2c07a598da097a2cfe_JaffaCakes118.exe windows:5 windows x86 arch:x86
9366ed377fc9d8683ad0c584b82b57b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedIncrement
LocalFree
FindClose
FindFirstFileW
QueryPerformanceFrequency
CreateEventW
SetFilePointer
SystemTimeToFileTime
FileTimeToLocalFileTime
GetVersionExW
GetTempPathW
GetWindowsDirectoryW
ReleaseMutex
CreateMutexW
GetExitCodeThread
CreateNamedPipeW
GetDriveTypeW
SetEvent
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
CopyFileW
GetUserDefaultLangID
OpenEventW
GetCurrentThreadId
InterlockedDecrement
RaiseException
DecodePointer
InitializeCriticalSectionAndSpinCount
CompareStringA
VirtualQuery
GetSystemInfo
IsBadReadPtr
WriteFile
FlushFileBuffers
GetUserDefaultLCID
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetACP
GetSystemDefaultLangID
LoadLibraryW
GetFileAttributesW
GetModuleHandleExW
ConnectNamedPipe
GetCurrentProcessId
UnhandledExceptionFilter
HeapSize
ReadFile
FileTimeToSystemTime
GetEnvironmentVariableW
ResumeThread
SetThreadContext
FlushInstructionCache
WriteProcessMemory
VirtualProtectEx
GetThreadContext
MoveFileExW
TerminateProcess
GetCurrentProcess
DuplicateHandle
ExitProcess
WaitForSingleObject
CreateProcessW
SetCurrentDirectoryW
GetSystemDirectoryW
GetModuleFileNameW
RemoveDirectoryW
Sleep
DeleteFileW
CloseHandle
UnmapViewOfFile
WideCharToMultiByte
MapViewOfFile
CreateFileMappingW
GetFileSize
CreateFileW
lstrlenA
GetModuleHandleW
FormatMessageW
MultiByteToWideChar
SetLastError
GetLastError
LoadLibraryA
GetSystemDirectoryA
GetProcAddress
DeleteCriticalSection
WriteConsoleW
SetStdHandle
OutputDebugStringW
GetProcessHeap
GetStringTypeW
GetCPInfo
GetOEMCP
IsValidCodePage
IsProcessorFeaturePresent
IsDebuggerPresent
RtlUnwind
GetCommandLineW
HeapAlloc
VirtualProtect
VirtualAlloc
ExitThread
CreateThread
HeapFree
LocalAlloc
GetCurrentThread
QueryPerformanceCounter
lstrlenW
lstrcatW
lstrcpyW
lstrcpynW
lstrcmpiW
GetTickCount
ResetEvent
GetTempFileNameW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetFileType
GetStdHandle
HeapReAlloc
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedExchange
LoadLibraryExA
EncodePointer
LCMapStringW
GetDateFormatW
GetTimeFormatW
GetVersion
GetProcessTimes
OpenProcess
GetExitCodeProcess
GetFileTime
SetFileTime
CompareFileTime
LoadLibraryExW
SetUnhandledExceptionFilter
user32
wsprintfW
GetDesktopWindow
PostThreadMessageW
DispatchMessageA
ExitWindowsEx
DispatchMessageW
CharUpperW
TranslateMessage
GetMessageA
GetMessageW
IsWindowUnicode
PeekMessageW
MsgWaitForMultipleObjectsEx
MessageBoxW
GetGUIThreadInfo
WaitForInputIdle
CharLowerW
MsgWaitForMultipleObjects
advapi32
RegOverridePredefKey
OpenProcessToken
AdjustTokenPrivileges
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupPrivilegeValueW
RegEnumValueW
SetEntriesInAclW
OpenThreadToken
GetTokenInformation
EqualSid
RegDeleteValueW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegOpenKeyW
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
SHGetFolderPathW
ole32
CoMarshalInterThreadInterfaceInStream
CoInitializeEx
CoUninitialize
CoRegisterPSClsid
CoRegisterClassObject
CoRevokeClassObject
CoGetInterfaceAndReleaseStream
CLSIDFromProgID
CoReleaseServerProcess
CoCreateInstance
CreateStreamOnHGlobal
CoUnmarshalInterface
CoReleaseMarshalData
CoCreateGuid
CoMarshalInterface
CoAddRefServerProcess
oleaut32
SafeArrayCreate
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayGetElement
SafeArrayDestroy
SafeArrayPutElement
VariantTimeToSystemTime
VariantChangeTypeEx
LoadTypeLi
LoadRegTypeLi
GetErrorInfo
VarBstrCat
SysAllocStringByteLen
SysStringByteLen
SystemTimeToVariantTime
VariantChangeType
BSTR_UserFree
VARIANT_UserFree
BSTR_UserUnmarshal
BSTR_UserMarshal
VARIANT_UserUnmarshal
VARIANT_UserSize
BSTR_UserSize
VARIANT_UserMarshal
SysAllocString
VariantCopy
VariantClear
VariantInit
SysStringLen
SysReAllocStringLen
SysAllocStringLen
SysFreeString
RegisterTypeLi
UnRegisterTypeLi
shlwapi
SHCreateStreamOnFileW
PathFileExistsW
rpcrt4
UuidToStringW
UuidCreate
RpcStringFreeW
NdrDllGetClassObject
IUnknown_AddRef_Proxy
NdrCStdStubBuffer2_Release
IUnknown_Release_Proxy
NdrStubCall2
NdrOleAllocate
NdrStubForwardingFunction
NdrOleFree
IUnknown_QueryInterface_Proxy
Sections
.text Size: 847KB - Virtual size: 847KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 418B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ