C:\Work\installer\Release\installer_.pdb
Static task
static1
Behavioral task
behavioral1
Sample
68e56acafcb0fe632ef7fc0d9d9a6588_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68e56acafcb0fe632ef7fc0d9d9a6588_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
68e56acafcb0fe632ef7fc0d9d9a6588_JaffaCakes118
-
Size
326KB
-
MD5
68e56acafcb0fe632ef7fc0d9d9a6588
-
SHA1
99bd546220ff8fadee2335cff747c485c9d5c72e
-
SHA256
7c4c29521545d8bb875e91b5ebbf342a39d336fbc77f566bc2cfaefc70454777
-
SHA512
c42f673feab8c17fcacec2f0aa0a6f8bae92e1d984ae4325dfba50e13b4221b2b701a32313fc698a48951bfa51436e193b0daefde7e71d289cdbf0d656901069
-
SSDEEP
6144:T3VTflVq72ECrYhiH6it/PMyWPC7EHwksThzkHY8AOoAt4qLTz754Z:T3VTdVq72ECrYhiH/t0a+wb9mY8OA7Ty
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68e56acafcb0fe632ef7fc0d9d9a6588_JaffaCakes118
Files
-
68e56acafcb0fe632ef7fc0d9d9a6588_JaffaCakes118.exe windows:5 windows x86 arch:x86
efee9af40fbd27be01ec5d9d6eade1c5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenW
TerminateProcess
GetModuleFileNameW
GetTempPathW
WaitForSingleObject
GetVersionExW
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
OutputDebugStringW
Process32FirstW
GetLocalTime
GetFileTime
GetModuleHandleW
GetTempFileNameW
GetSystemTime
GetExitCodeProcess
GetVersion
MultiByteToWideChar
CopyFileW
WriteConsoleW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SystemTimeToTzSpecificLocalTime
CreateProcessW
DeleteCriticalSection
DecodePointer
RaiseException
CloseHandle
FileTimeToSystemTime
GetLastError
Sleep
CreateFileW
InitializeCriticalSectionAndSpinCount
GetProcAddress
InterlockedDecrement
GetCommandLineA
GetOEMCP
IsValidCodePage
HeapSize
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadFile
HeapReAlloc
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
HeapAlloc
HeapFree
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetEndOfFile
SetFilePointerEx
WideCharToMultiByte
FormatMessageW
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
SetLastError
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
GetCPInfo
LCMapStringW
GetLocaleInfoW
IsDebuggerPresent
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
FreeLibrary
LoadLibraryExW
user32
wvsprintfW
EnumChildWindows
SendMessageW
EnumWindows
GetDlgCtrlID
GetWindowThreadProcessId
advapi32
GetUserNameW
RegCloseKey
RegQueryInfoKeyW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyW
RegDeleteValueW
RegOpenKeyW
RegEnumValueW
RegQueryValueExW
shell32
SHGetFolderPathW
ole32
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CoInitialize
oleaut32
SysAllocStringLen
GetErrorInfo
VariantInit
VariantClear
SysAllocString
SysFreeString
wininet
HttpSendRequestW
HttpOpenRequestW
InternetCloseHandle
InternetOpenW
InternetReadFile
InternetConnectW
urlmon
URLDownloadToFileW
rpcrt4
UuidCreate
UuidToStringW
Sections
.text Size: 215KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ