SetIEInstalledDate.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1c5eb0e8f00fd584e8d1d3006278fe76_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
1c5eb0e8f00fd584e8d1d3006278fe76_JaffaCakes118
-
Size
165KB
-
MD5
1c5eb0e8f00fd584e8d1d3006278fe76
-
SHA1
03f5aa75940b9176a97ac41257f306c33cca93da
-
SHA256
e026f6f1a5a4f5b39e68c8cdb050334174764d2c7fe041073c6e64872a3a4099
-
SHA512
592c5856367f942c29f9f88c7ed20f65eb453475991ffafa11cd72b4c45ca3e58f47af0d4daf6cda2a3800de45789d55596bfcfe3588ee4f7f77417e52474590
-
SSDEEP
3072:yo5Htro+64OBGLvtwT+rGkLB0oA50BFLqlNyoNCzN2D3zCCR9GPU1:351llOBGLvuT+rjLBxAblNyN2zz7RWM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c5eb0e8f00fd584e8d1d3006278fe76_JaffaCakes118
Files
-
1c5eb0e8f00fd584e8d1d3006278fe76_JaffaCakes118.exe windows:6 windows x86 arch:x86
7b9d9ea5ab544d6e599e32c9b3cb16e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeviceIoControl
HeapCreate
LocalAlloc
GetCommandLineW
GetEnvironmentVariableW
CompareStringW
IsWow64Process
EncodePointer
DecodePointer
ExpandEnvironmentStringsW
GetVersionExA
HeapSize
HeapDestroy
GetLastError
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
HeapFree
VirtualQuery
MapViewOfFile
CreateFileMappingW
GetFileSize
UnmapViewOfFile
TlsAlloc
GetLocalTime
TlsSetValue
HeapReAlloc
HeapAlloc
TlsGetValue
GetTempFileNameW
GetWindowsDirectoryW
GetFileAttributesW
GetTempPathW
SetLastError
LocalFree
FormatMessageW
RaiseException
ExitProcess
TlsFree
GetWindowsDirectoryA
CloseHandle
GetCurrentThread
ReleaseMutex
WaitForSingleObject
SetFilePointer
WriteFile
GetModuleFileNameA
CreateMutexW
CreateFileW
GetModuleFileNameW
DeleteFileW
GetVersion
GetSystemInfo
CreateMutexA
CreateFileMappingA
CreateFileA
DeleteFileA
LoadLibraryA
ExpandEnvironmentStringsA
GetProcAddress
GetModuleHandleW
GetFileSizeEx
FlushFileBuffers
WideCharToMultiByte
MultiByteToWideChar
OutputDebugStringA
IsDebuggerPresent
msvcrt
_wcsicmp
iswctype
swscanf_s
_wtoi
wcstok
fclose
feof
fgetws
_wfopen
_wcsnicmp
memcpy
towlower
_vsnwprintf
??1type_info@@UAE@XZ
_vsnprintf
__p__fmode
__set_app_type
_purecall
?terminate@@YAXXZ
_except_handler4_common
_controlfp
_unlock
wcsrchr
??2@YAPAXI@Z
__CxxFrameHandler3
memset
free
??3@YAXPAX@Z
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
__dllonexit
_lock
_onexit
malloc
advapi32
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
InitializeSecurityDescriptor
OpenThreadToken
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessAllowedAce
EqualSid
SetSecurityDescriptorDacl
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegOpenKeyW
shell32
ord165
CommandLineToArgvW
dbghelp
MiniDumpWriteDump
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
user32
UnregisterClassA
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndfdamh Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE