C:\BriqsBuildDirectories\BriqsSourceDirectory\target\briqs20\retail\i386\netfxupdate.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1b2fec4af3e32076536c2e171da14fb6_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1b2fec4af3e32076536c2e171da14fb6_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1b2fec4af3e32076536c2e171da14fb6_JaffaCakes118
-
Size
232KB
-
MD5
1b2fec4af3e32076536c2e171da14fb6
-
SHA1
59e0ee15e60e76ab6dfb8b90d4b1c9d613f3de2a
-
SHA256
d82692865d2cdf831c82663219a63e32cfd5382273246845bc73abe54f8ad207
-
SHA512
4e54e62e8fbf4c90311ababc887ea2a8b644f78e486b6deeb9c4a884d465c68d9b1f5e49f6c473dce93c59088dda954238e7ec61bf294ac0d6892207eebd6857
-
SSDEEP
6144:oAdaLygQyv3aPGqWL5OrJSs6bYm+Mv3VElESBVDYC:MLy4zGJSs8vyDYC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b2fec4af3e32076536c2e171da14fb6_JaffaCakes118
Files
-
1b2fec4af3e32076536c2e171da14fb6_JaffaCakes118.exe windows:6 windows x86 arch:x86
c93fb3b3067c891bb5db2cf4ac13c7cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCloseKey
kernel32
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedExchange
CloseHandle
GetLastError
CreateFileA
SetEvent
HeapAlloc
GetProcessHeap
HeapFree
GetProcAddress
LoadLibraryA
DeleteCriticalSection
LocalFree
FormatMessageA
GetModuleFileNameA
SetFilePointer
GetFileType
GetTempPathA
FlushFileBuffers
WriteFile
GetLocalTime
GetVolumeInformationA
GetSystemDirectoryA
GetVersionExA
GetWindowsDirectoryA
ResetEvent
TerminateProcess
GetExitCodeProcess
WaitForMultipleObjects
CreateProcessA
CreateEventA
Sleep
ReleaseMutex
WaitForSingleObject
CreateMutexA
CreateThread
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
RaiseException
RtlUnwind
ExitProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
GetACP
GetOEMCP
GetCPInfo
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
HeapSize
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
IsBadWritePtr
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
ReadFile
GetLocaleInfoA
SetEndOfFile
user32
LoadStringA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 424KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE