TrustedInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
326ea92a79a62b10c31c65f2adba467e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
326ea92a79a62b10c31c65f2adba467e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
326ea92a79a62b10c31c65f2adba467e_JaffaCakes118
-
Size
227KB
-
MD5
326ea92a79a62b10c31c65f2adba467e
-
SHA1
698e41d4cb39ed2ff55dcb75a376a6c0d5a2b540
-
SHA256
425c3e9d4e10dfd1216ff456e030a5c9a98a78b7902f29ff30d2fb38b102a6c4
-
SHA512
f54b12250fdd4d8c00709fb595d2b64dc080ac573c652ac45e09f7c9c2a4e02b6dd797598c34681eec33bbc9f2c14844523abf7af52da5525ed28e65918818dc
-
SSDEEP
3072:YXEgwW6ntCESQHtDxl7S9njyrAeHqRRzAFHjmsjuhcKOYp2iv66J+4eqFKbX:YXE0hESQNDxllrM/zAnju6KPUdqkbX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 326ea92a79a62b10c31c65f2adba467e_JaffaCakes118
Files
-
326ea92a79a62b10c31c65f2adba467e_JaffaCakes118.exe windows:6 windows x86 arch:x86
eb3d4b4843183a5b71eaed184f4ed764
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
SetServiceStatus
RegCloseKey
RegOpenKeyExW
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
OpenProcessToken
RegOpenKeyW
RegCreateKeyExW
RegDeleteKeyW
CloseServiceHandle
InitiateShutdownW
LookupPrivilegeValueW
AdjustTokenPrivileges
ChangeServiceConfigW
QueryServiceConfigW
OpenSCManagerW
OpenServiceW
RegQueryValueExW
RegEnumValueW
kernel32
LoadLibraryW
GetSystemDirectoryW
GetTickCount
QueryPerformanceCounter
CreateDirectoryW
ExpandEnvironmentStringsW
GetFullPathNameW
GetFileAttributesExW
GetProcAddress
GetFileAttributesW
GetVersionExW
lstrlenW
GetEnvironmentVariableW
GetSystemTime
MoveFileExW
GetWindowsDirectoryW
CreateProcessW
CreateFileW
SetFileTime
GetExitCodeProcess
FindFirstFileW
CompareFileTime
FindNextFileW
DeleteFileW
FindClose
OutputDebugStringA
UnhandledExceptionFilter
TerminateProcess
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
GetSystemTimeAsFileTime
GetCurrentProcessId
FreeLibrary
GetCurrentProcess
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcmpW
ExitProcess
HeapSetInformation
CreateEventW
GetLastError
CreateThread
WaitForMultipleObjects
TerminateThread
WaitForSingleObject
GetExitCodeThread
CloseHandle
SetEvent
InterlockedExchange
GetCurrentThreadId
msvcrt
__set_app_type
wcstoul
??2@YAPAXI@Z
_vsnwprintf
_vsnprintf
memset
memcpy
??3@YAXPAX@Z
__wgetmainargs
_cexit
_exit
_controlfp
_except_handler4_common
?terminate@@YAXXZ
wcsrchr
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
ole32
CoDisconnectContext
CoRevokeClassObject
CoSuspendClassObjects
CoCreateInstance
CoRegisterClassObject
CoInitializeSecurity
CoInitializeEx
CoGetMalloc
CoUninitialize
CoResumeClassObjects
Sections
.text Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE