msninst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
287282b67d449c672adc7c4b72cc82fd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
287282b67d449c672adc7c4b72cc82fd_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
287282b67d449c672adc7c4b72cc82fd_JaffaCakes118
-
Size
129KB
-
MD5
287282b67d449c672adc7c4b72cc82fd
-
SHA1
72054a12577fe1d45d6ad1c08855e7b4c1db59af
-
SHA256
5c19f0e75ef1c6edd89168d44b2d65f6fceab44ab201745743e9612bfc254f6e
-
SHA512
2b82c28380256fef2cbc28bac53844c7a8a24850dba72412aeb04853b9753662b8b9b7cdd97efb8321cb17bb0fce7a1c3a465fef6f11364754ea5fc29a2723b5
-
SSDEEP
1536:owy7VZZ+fgFpGzlGEiwJgFL2Tl4xk8kXRXMMGBkyJMjZROYJT3bQghxHCZOX:owk/LpIT6Klkk8kXRcaC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 287282b67d449c672adc7c4b72cc82fd_JaffaCakes118
Files
-
287282b67d449c672adc7c4b72cc82fd_JaffaCakes118.exe windows:5 windows x86 arch:x86
ab4a78242e30b5066017e7225694cf93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptReleaseContext
kernel32
SetEvent
CreateProcessA
GetPrivateProfileIntA
lstrcpynA
DuplicateHandle
GetCurrentProcess
CreateEventA
MapViewOfFile
CreateFileMappingA
GetModuleFileNameA
EnterCriticalSection
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
GetStartupInfoA
GetVersionExA
HeapFree
RtlUnwind
TerminateProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
VirtualQuery
HeapAlloc
VirtualAlloc
HeapReAlloc
IsBadWritePtr
HeapSize
GetOEMCP
GetCPInfo
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
InterlockedExchange
ReleaseMutex
CloseHandle
UnmapViewOfFile
LeaveCriticalSection
SetUnhandledExceptionFilter
LocalAlloc
GetCommandLineA
MultiByteToWideChar
GetModuleFileNameW
CreateMutexA
WaitForSingleObject
ExitProcess
lstrlenA
lstrlenW
DeleteFileW
FormatMessageA
LocalFree
FreeLibrary
LoadLibraryA
GetProcAddress
GetLastError
DeleteCriticalSection
InitializeCriticalSection
RaiseException
WideCharToMultiByte
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedCompareExchange
GlobalDeleteAtom
GetSystemDefaultLangID
GetPrivateProfileStringW
FindClose
FindNextFileA
FindFirstFileA
RemoveDirectoryW
FindNextFileW
SetFileAttributesW
FindFirstFileW
InterlockedIncrement
GetWindowsDirectoryA
GlobalAddAtomA
CreateFileW
LocalReAlloc
InterlockedDecrement
GetProcessTimes
QueryPerformanceFrequency
SetFilePointer
GetLocalTime
FlushFileBuffers
GetAtomNameA
lstrcmpA
GetCommandLineW
user32
LoadStringW
LoadStringA
GetSysColor
ReleaseDC
GetDC
SystemParametersInfoW
ExitWindowsEx
RegisterWindowMessageW
MessageBoxA
shfolder
SHGetFolderPathA
gdi32
DeleteObject
GetDeviceCaps
GetPaletteEntries
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE