d:\b\build\slave\chrome-official\build\src\build\Release\chrome_exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
45fb3c42ac7acb8e52a0c10ceaeb4089_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
45fb3c42ac7acb8e52a0c10ceaeb4089_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
45fb3c42ac7acb8e52a0c10ceaeb4089_JaffaCakes118
-
Size
1.1MB
-
MD5
45fb3c42ac7acb8e52a0c10ceaeb4089
-
SHA1
a9613302c4f3add3abb413b47ea0d7c5118f6016
-
SHA256
ff682ac6af0c8faee1f1ecd2c9ae7c7811f6df9aceaee12f058765c54e028d0a
-
SHA512
529a114e5848963a2b31737ee04c062431f2bd7b6fe85864c678e4be6fdb6a128199ca9ee8e31e1abea50196149615f334014f0be1d96eca21001b65bca0ef17
-
SSDEEP
24576:qYLKIik5/qrhSmU/Zk4OVAME3mcuumsgyKXXtBKPFxI:DLViVrhPU/Zk4GE2cuums2X9BKPHI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45fb3c42ac7acb8e52a0c10ceaeb4089_JaffaCakes118
Files
-
45fb3c42ac7acb8e52a0c10ceaeb4089_JaffaCakes118.exe windows:5 windows x86 arch:x86
72825eb5287076a53156256a7f6a97ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathFileExistsW
PathRemoveFileSpecW
kernel32
SetEvent
InitializeCriticalSection
LeaveCriticalSection
GetLastError
SetLastError
EnterCriticalSection
ResetEvent
CreateEventW
PostQueuedCompletionStatus
CreateIoCompletionPort
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
TerminateJobObject
CreateThread
SetHandleInformation
VirtualFree
GetProcessHandleCount
LocalFree
ResumeThread
SignalObjectAndWait
InterlockedExchange
InterlockedIncrement
InterlockedDecrement
GetThreadContext
MapViewOfFile
FreeLibrary
LoadLibraryW
AssignProcessToJobObject
GetExitCodeProcess
CreateFileMappingW
WriteProcessMemory
RegisterWaitForSingleObject
UnregisterWaitEx
VirtualFreeEx
VirtualAllocEx
GetFileAttributesW
CreateFileW
GetLongPathNameW
VirtualProtectEx
QueryDosDeviceW
CreateJobObjectW
GetCurrentProcessId
CreateNamedPipeW
OpenEventW
SearchPathW
CreateMutexW
GetCurrentDirectoryW
lstrlenW
DebugBreak
VirtualQuery
WideCharToMultiByte
ReadProcessMemory
SuspendThread
ReleaseSemaphore
CreateSemaphoreW
WaitNamedPipeW
WriteFile
TransactNamedPipe
SetNamedPipeHandleState
WaitForMultipleObjects
SystemTimeToFileTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
SetEnvironmentVariableW
ExpandEnvironmentStringsW
UnmapViewOfFile
ReadFile
VirtualAlloc
WaitForSingleObject
GetFileTime
SetFilePointer
FormatMessageA
ReleaseMutex
MultiByteToWideChar
GetUserDefaultLangID
GetNativeSystemInfo
GetVersionExW
RaiseException
IsDebuggerPresent
InterlockedExchangeAdd
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
GetStdHandle
RtlCaptureStackBackTrace
SetEndOfFile
FlushFileBuffers
WTSGetActiveConsoleSessionId
FindResourceW
LoadResource
SizeofResource
LockResource
UnhandledExceptionFilter
GetStartupInfoW
HeapFree
GetConsoleCP
GetConsoleMode
LoadLibraryA
SetStdHandle
GetFileType
HeapReAlloc
HeapAlloc
GetProcessHeap
GetCPInfo
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapCreate
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetQueuedCompletionStatus
SetInformationJobObject
TerminateProcess
GetTickCount
GetModuleHandleW
GetCurrentProcess
GetUserDefaultUILanguage
GetSystemDirectoryW
GetWindowsDirectoryW
LocalAlloc
GetThreadLocale
CloseHandle
QueueUserWorkItem
GetTempPathW
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
CreateProcessW
GetCommandLineW
ExitProcess
GetModuleHandleA
SetCurrentDirectoryW
GetProcAddress
GetModuleFileNameW
LoadLibraryExW
GetEnvironmentVariableW
user32
CloseWindowStation
CloseDesktop
GetUserObjectInformationW
GetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
MessageBoxW
CharUpperW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
wtsapi32
WTSQueryUserToken
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
winmm
timeGetTime
advapi32
SetSecurityDescriptorDacl
SetThreadToken
OpenProcessToken
RegCloseKey
RegOpenKeyExW
RevertToSelf
RegDisablePredefinedCache
SetTokenInformation
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorSacl
GetLengthSid
RegCreateKeyExW
CopySid
CreateWellKnownSid
GetTokenInformation
InitializeSecurityDescriptor
CreateRestrictedToken
EqualSid
DuplicateToken
LookupPrivilegeValueW
DuplicateTokenEx
ConvertSecurityDescriptorToStringSecurityDescriptorW
SetFileSecurityW
GetFileSecurityW
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
ConvertSidToStringSidW
RegSetValueExW
RegEnumKeyExW
GetSecurityInfo
SetEntriesInAclW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
CreateProcessAsUserW
shell32
CommandLineToArgvW
SHGetFolderPathW
Exports
Exports
CrashForException
DumpProcess
SetActiveURL
SetClientId
SetCommandLine
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
Sections
.text Size: 472KB - Virtual size: 471KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 329KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 101KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE