ie4uinit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3ea055be040f003b15d85a48a3126960_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ea055be040f003b15d85a48a3126960_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ea055be040f003b15d85a48a3126960_JaffaCakes118
-
Size
129KB
-
MD5
3ea055be040f003b15d85a48a3126960
-
SHA1
54fef14cb6c01dc7e87d30b6aa0844698dc3a7ca
-
SHA256
47e389f7f322976231eab4d73d73910b461cea070748652511c50f7ea8fce0fc
-
SHA512
26220aaf4d99467c4c75af31dc41ad17b49ec25fcaa75266df8e443eb0827af6f389589ec7e1b710b1bddf92b49bb03c1bb6c1216c6471b9030d9426ce88ce02
-
SSDEEP
1536:g/p/ofqDteozUSO54GNLu5jJIgHCyNW2DpBqtLWgzZx2j3Cpmm:g/7teokmOE+gHCyNBl0NWMZAroj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ea055be040f003b15d85a48a3126960_JaffaCakes118
Files
-
3ea055be040f003b15d85a48a3126960_JaffaCakes118.exe windows:6 windows x86 arch:x86
0eef0c5bc0977cf313fa3ea47359e554
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegEnumValueW
RegOpenKeyExW
RegSetValueW
RegDeleteKeyW
RegQueryValueW
kernel32
LoadLibraryW
lstrlenW
GetLastError
GetEnvironmentVariableW
GetVersion
GetModuleHandleW
SetErrorMode
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindClose
FindNextFileW
FindFirstFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
lstrcmpW
FindFirstFileExW
GetShortPathNameW
GetSystemDefaultUILanguage
CreateDirectoryW
LocalFree
LocalAlloc
GetProcAddress
CloseHandle
CreateFileW
GetTickCount
Sleep
SearchPathW
FindResourceW
GetUserDefaultUILanguage
UnmapViewOfFile
GetLocaleInfoW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
FindResourceExW
LoadResource
SetLastError
GetPrivateProfileStringW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
RtlUnwind
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
FreeLibrary
GetSystemDirectoryW
GetVersionExW
GetModuleFileNameW
user32
MessageBoxW
GetMenuItemInfoW
GetMenuItemCount
DestroyMenu
CreatePopupMenu
SendInput
GetCursorPos
SystemParametersInfoW
PostQuitMessage
SetWinEventHook
KillTimer
DispatchMessageW
GetMessageW
SetTimer
UnhookWinEvent
BlockInput
LoadStringW
msvcrt
bsearch
_wcsnicmp
_wcsicmp
wcsncmp
_controlfp
?terminate@@YAXXZ
memcpy
__set_app_type
__p__fmode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
??2@YAPAXI@Z
??3@YAXPAX@Z
memset
_vsnwprintf
__p__commode
shell32
ord190
SHGetSpecialFolderPathW
SHBindToParent
SHParseDisplayName
SHGetDesktopFolder
ord165
ord155
SHChangeNotify
SHGetSpecialFolderLocation
SHSetLocalizedName
ord526
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
advpack
RunSetupCommandW
ExecuteCabW
RegRestoreAllW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
shlwapi
SHCopyKeyW
StrCmpNIW
PathAppendW
PathFileExistsW
PathCombineW
PathAddBackslashW
ord437
ord158
StrStrIW
SHGetValueW
StrCmpIW
SHSetValueW
SHDeleteValueW
PathRemoveBlanksW
PathAddExtensionW
SHRegGetValueW
PathRemoveExtensionW
ord433
ord225
SHDeleteKeyW
PathRemoveFileSpecW
iertutil
ord33
ord37
oleacc
AccessibleObjectFromEvent
oleaut32
SysFreeString
VariantClear
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.tdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE