C:\Work\installer\Release\installer_.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ac00234f4814022d0943d113566eac82_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
ac00234f4814022d0943d113566eac82_JaffaCakes118
-
Size
326KB
-
MD5
ac00234f4814022d0943d113566eac82
-
SHA1
890dbd0fb0c03660c5e6a37a7c7b3a9135a328a4
-
SHA256
2e24b507d0290c2168af6a8903a6eeefdee9c4811e7f4d891e257df6fe77b590
-
SHA512
942622eede888cf4e2fa41631e2106f8c38d2bc1aee6bb4d979e6ddbc28092f42e2b7dd92c604fa27a78049f29b68b7e4e87252daebf2ceb43e47baed82e8b8a
-
SSDEEP
6144:T3VTflVq72ECrYhiH6it/PMyWPC7EHwksThzkHY8AOoAt4qLTz754x:T3VTdVq72ECrYhiH/t0a+wb9mY8OA7Tu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac00234f4814022d0943d113566eac82_JaffaCakes118
Files
-
ac00234f4814022d0943d113566eac82_JaffaCakes118.exe windows:5 windows x86 arch:x86
efee9af40fbd27be01ec5d9d6eade1c5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenW
TerminateProcess
GetModuleFileNameW
GetTempPathW
WaitForSingleObject
GetVersionExW
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
OutputDebugStringW
Process32FirstW
GetLocalTime
GetFileTime
GetModuleHandleW
GetTempFileNameW
GetSystemTime
GetExitCodeProcess
GetVersion
MultiByteToWideChar
CopyFileW
WriteConsoleW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SystemTimeToTzSpecificLocalTime
CreateProcessW
DeleteCriticalSection
DecodePointer
RaiseException
CloseHandle
FileTimeToSystemTime
GetLastError
Sleep
CreateFileW
InitializeCriticalSectionAndSpinCount
GetProcAddress
InterlockedDecrement
GetCommandLineA
GetOEMCP
IsValidCodePage
HeapSize
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadFile
HeapReAlloc
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
HeapAlloc
HeapFree
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetEndOfFile
SetFilePointerEx
WideCharToMultiByte
FormatMessageW
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
SetLastError
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
GetCPInfo
LCMapStringW
GetLocaleInfoW
IsDebuggerPresent
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
FreeLibrary
LoadLibraryExW
user32
wvsprintfW
EnumChildWindows
SendMessageW
EnumWindows
GetDlgCtrlID
GetWindowThreadProcessId
advapi32
GetUserNameW
RegCloseKey
RegQueryInfoKeyW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyW
RegDeleteValueW
RegOpenKeyW
RegEnumValueW
RegQueryValueExW
shell32
SHGetFolderPathW
ole32
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CoInitialize
oleaut32
SysAllocStringLen
GetErrorInfo
VariantInit
VariantClear
SysAllocString
SysFreeString
wininet
HttpSendRequestW
HttpOpenRequestW
InternetCloseHandle
InternetOpenW
InternetReadFile
InternetConnectW
urlmon
URLDownloadToFileW
rpcrt4
UuidCreate
UuidToStringW
Sections
.text Size: 215KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ