C:\Program Files\ijji\ijji REACTOR_alpha\USA_PurpleOutBound.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1954ccbdf342c430b1e654a3238fdd7a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1954ccbdf342c430b1e654a3238fdd7a_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1954ccbdf342c430b1e654a3238fdd7a_JaffaCakes118
-
Size
288KB
-
MD5
1954ccbdf342c430b1e654a3238fdd7a
-
SHA1
f4ef19ddbb99be7f492227e9618d43498bc1aa87
-
SHA256
31b5c99953c6bde2b7dcbdc84ba5469bfc67873604379c95421129839fa54da2
-
SHA512
46f4ae10bdf7ab8640eadc2a7b0832297365359786c0e7cdca1c7aa23d12147e68fbec4ea824cc97234a788c75368136e89313e35d2441fee6d4de687c674026
-
SSDEEP
6144:LtqOwqjG2Ct6U7UnaS8/Z2U6TBqZICdLchkaDRouTa86uY344B:ZqOwKG2C4U7UK/ZwTsfalL286uY31
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1954ccbdf342c430b1e654a3238fdd7a_JaffaCakes118
Files
-
1954ccbdf342c430b1e654a3238fdd7a_JaffaCakes118.exe windows:4 windows x86 arch:x86
8417530351f89a77381223155fd787f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetSetOptionA
InternetOpenA
InternetGetLastResponseInfoA
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
InternetCanonicalizeUrlA
InternetOpenUrlA
shlwapi
StrDupA
PathIsDirectoryA
urlmon
URLDownloadToFileA
hanreportforclient
HanReportInit
HanReportSendPosLogSync
kernel32
InitializeCriticalSection
IsBadCodePtr
IsBadReadPtr
CompareStringA
GetStringTypeW
GetSystemInfo
VirtualProtect
CompareStringW
SetEnvironmentVariableA
GetTickCount
SetFileAttributesA
GetFileAttributesA
GetTimeZoneInformation
SetCurrentDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetTempPathA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesExA
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateDirectoryA
DeleteFileA
CloseHandle
WriteFile
CreateFileA
GetLastError
SetFileTime
GetFileTime
ResumeThread
WaitForSingleObject
CreateThread
GetSystemDirectoryA
SetStdHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFilePointer
lstrcmpiA
GetVersionExA
GetCommandLineA
GetProcAddress
LoadLibraryA
FreeLibrary
CreateMutexA
ReleaseMutex
ReadFile
GetLocalTime
DosDateTimeToFileTime
GetStringTypeA
VirtualQuery
InterlockedExchange
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
HeapSize
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
SetEndOfFile
GetWindowsDirectoryA
DeleteCriticalSection
SetUnhandledExceptionFilter
GetLocaleInfoA
ExitProcess
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetACP
GetOEMCP
GetCPInfo
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
user32
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadCursorA
LoadIconA
BeginPaint
ShowWindow
PostQuitMessage
DefWindowProcA
KillTimer
SetTimer
SendMessageA
PostMessageA
IsWindow
wsprintfA
LoadStringA
CreateWindowExA
EndPaint
RegisterClassExA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetFolderPathA
ijjiprepatch_r
_GET_CurrentUnzipFileName@8
_DoPrePatch@8
_GET_FileName@8
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE